Where would we be without computers, smartphones, music and video streaming? Likely, we’d still be using decade-old technologies like typewriters, landlines, CDs and DVDs. These newer products are prime examples of disruptive technology: exciting innovations that displace pre-established items, and drastically shake up the way we live, work, interact and communicate.
Another big buzz in the media again. Looks like there has been another dangerous vulnerability identified and rated a 10 for impact, and a 10 for exploitability. This is the threat we now know as the Shellshock Vulnerability.
The major concern is that, if an attacker has the skill to craft a packet to take advantage of the vulnerability, they can inject code that compromises a target machine.
That seems simple enough – and from a conceptual perspective, it is. So why it is rated so high? And how does it compare to the Heartbleed bug we recently heard so much about?
From “Russian Hackers Amass Over a Billion Internet Passwords” to “Stolen Passwords at Core of Breach”, or “New Vulnerabilities Expose User Passwords for Sites You Use.”, you should be alarmed. [Read more…]
The proliferation of personal mobile devices is changing the way we do business — and companies are either embracing it, or sticking with the status quo. But there is another option that’s gaining momentum.
On one end of the spectrum is COPE (company-issued, personally-enabled), where the organization chooses which devices employees use, and the company owns and pays for the device.
On the other end of the spectrum is BYOD (bring-your-own-device), where employees are allowed to use their personal mobile device for work, but they pay for it and typically support it themselves.
The company benefits from BYO by not having to purchase the devices. But, because IT no longer has control over which devices are being used on the network, corporate security measures are difficult to enforce. There are also issues around data ownership, data integrity and the management of alien devices in the corporate environment.
A third option strikes the balance between COPE and BYOD, and it’s gaining in popularity.
It’s funny how things evolve so quickly. Just a few years ago, the thought of employees using their own phones or laptops for work at work was unthinkable.
But as the consumerization of IT trend grows from a trickle to a flood, many organizations have no choice but consider how to implement a Bring Your Own Device (BYOD) program. And the experience at Softchoice was no different.