Balancing Security and Privacy in BYOD

According to Forrester Research, more than half of North American and European organizations are developing bring-your-own-device (BYOD) policies in the workplace. However, letting employees use their personal mobile devices for work-related purposes can cause problems relating to company security policies, laws and employee privacy perceptions. Many businesses, for example, have deployed enterprise mobility management (EMM) … Continue reading Balancing Security and Privacy in BYOD

Five Best Practices for Securing Mobile Devices and Everything They Touch

In the span of just one year from 2012 to 2013, smartphone thefts in the U.S. nearly doubled to 3.1 million, according to Consumer Reports. Every one of those losses and thefts could enable multiple security breaches for businesses and organizations. Why? Because confidential data stored on a mobile phone isn’t the only asset that’s … Continue reading Five Best Practices for Securing Mobile Devices and Everything They Touch

Five Best Practices for Securing Mobile Devices and Everything They Touch

In the span of just one year from 2012 to 2013, smartphone thefts in the U.S. nearly doubled to 3.1 million, according to Consumer Reports. Every one of those losses and thefts could enable multiple security breaches for businesses and organizations. Why? Because confidential data stored on a mobile phone isn’t the only asset that’s … Continue reading Five Best Practices for Securing Mobile Devices and Everything They Touch

Privacy and Security from the Inside Out

The Boyd School of Law School will explore privacy and security across the delivery path. CellTrust’s K Royal will weigh in on vendors and partnerships, and the importance of building reliable protections into arrangements with other organizations, and the due diligence that reinforce those arrangements. This program is approved for 6.00 CLEs.

You’ve Adopted a BYOD Mobile Strategy. Now What?

If you are among the 74 percent of organizations using or adopting a bring-your-own-device (BYOD) policy then you know that the key to a successful enterprise mobile strategy is understanding not only technology, but also human nature. Read more here.

Why it’s time to rethink email security

Should members of the U.S military who click on phishing emails be court-martialed? Admiral Michael Rogers thinks so. As director of the National Security Agency, he’s dealing with a hack of the Pentagon’s Joint Staff network that was enabled by four people who fell for phishing emails. Read more: http://www.itproportal.com/2015/11/16/why-its-time-to-rethink-email-security/