7 Technologies That Make BYOD a Reality

seven technologies to enable a BYOD strategy

Let’s start with the obvious.

There is no silver bullet, one-size-fits-all checklist for creating the perfect Bring Your Own Device strategy. Every organization is completely different.

But it’s not as bad as it sounds. Many of the technologies necessary to support a strategy are probably already in your ecosystem. It’s just a matter of knowing what’s missing, and how to leverage what you’ve already got.

To give you a hand, we’ve assembled seven tools and technologies that make planning and executing your BYOD strategy a reality.

[Read more…]

Destroy Your Laptop Without Ramifications!

This article originally appeared on Stephen’s personal blog. You can visit it here.

Don’t let the introduction scare you.This post is actually more appropriate for less technical readers who have had a computer failure and lost data.

While on a recent business trip, the hard drive light on my laptop remained solid at all times. As time went on, Windows slowed to a crawl and became unusable. I looked at the resource monitor to see what was causing the disk to spin so much, so that I could kill it, but there weren’t even any IO hits. When I rebooted the computer I got a message “Detection Error on HDD” and Windows wouldn’t start at all any more.

It was basically over. While we were able to mount it with Ubuntu and recover some of the data left there, I was very glad to have committed to synchronizing data consistently enough to not lose anything.

[Read more…]

What is it that you want to protect from data loss the most?

This can be a very difficult question.  A question that has created many products and solutions (inside and outside of IT…think insurance.)  Other than the people, the most critical asset we have in most organizations is the information.  If it were not for that information we wouldn’t need all of the switches, routers, servers, and storage.  If we aren’t protecting the data that we value most as a starting point then what are we doing?

DLP (Data Loss Prevention) has been one of the dirtiest words over the last ten years.  It may be even considered worse than cloud, at least in security circles.  What made this term so unpalatable is the fact that it somewhat implies that without these solutions branded Data Loss/Leakage Prevention that we are losing and leaking data.  It implies that these solutions are the silver bullet.  The end all to be all.  Obviously marketing gone wild.  There is definitely some merit in this though.  And applied correctly with other technologies can actually provide a fantastic last line of defense, which used to be endpoint anti-virus.

If the attack traffic got through the firewall, then the Network Intrusion Prevention System, then hopefully the endpoint anti-virus software would pick it up.  But what happens when it doesn’t?  What happens when the system has been compromised without detecting for a while.  This is where the data starts to get pulled out of the network, or exfiltrated.

Assuming there is a compromise, let’s delve into our solutions that make up a DLP strategy and provide some examples of when each of them is used.  Ideally you’ll find which of these following solutions fit best in your environment today. [Read more…]

The lowdown on Data Loss Prevention and how to prevent data leakage

What is it that you want to protect most?

This can be a very difficult question.  A question that has created many products and solutions (inside and outside of I.T…think insurance).  Other than the people, the most critical asset we have in most organizations is the information.  If it were not for that information we wouldn’t need all of the switches, routers, servers, and storage.  If we aren’t protecting the data that we value most as a starting point then what are we doing?

DLP (Data Loss Prevention) has been one of the dirtiest words over the last ten years.  It may be even considered worse than cloud, at least in security circles.  What made this term so unpalatable is the fact that it somewhat implies that without these solutions branded Data Loss/Leakage Prevention that we are losing and leaking data. [Read more…]