Security In A New Mobile World [Trend Micro]

In case you missed it, Smartphones and other mobile devices overtook traditional PCs in sales back in 2010. How did this happen?

There are a whole host of factors at play. Foremost among them has been consumerization, which gives consumers access to powerful computers and high-speed internet at home. Responding to increased expectations at work, employers began embracing Bring Your Own Device (BYOD) policies and allowing consumer mobile devices – like smartphones, tablets, non-PC laptops and netbooks – into the office. Employees, for their part, started using those devices to access their organization’s corporate networks and cloud service platforms, which helped them become more responsive and productive at home, on the road and in the office.

And everyone lived happily ever after. Well, not quite.

[Read more…]

Mobile Devices Are Flooding The Office – Can You Rise Above It? [Cisco]

By 2015, more than 10 billion WIFI-enabled devices will enter the market. Many of them will find their way into office buildings, changing employee habits and the way we work, as more and more users depend on tablets, smartphones and similar machines for a variety of daily personal and professional tasks. And as these devices become ubiquitous at work, more employees are expecting full network access, even on non-corporate devices.

Remember your first security policy? Good stuff on, bad stuff off. But these days, in our new mobile consumerized BYOD world, defining good and bad has become really difficult. And the one or two policies of yore have become five, ten and more. Plus, forget about just defining these policies, you now need to enforce them as well. Now there’s compliance and proving your network, flooded with these new devices, is actually still secure.

[Read more…]

The 3 Biggest Threats to Digital Security In the Years Ahead [Sophos]

The 3 Biggest Threats to Digital Security in the years ahead

Defending against cyber-attacks from every direction demands a solid line of defense.

As the availability of commercial tools makes launching cyber-attacks easier than ever, cyber-criminals are getting bolder. The result, of course, is that protecting your organization’s endpoints, data, email, web, servers and mobile devices is becoming a lot more complicated.

Three big areas pose the greatest threats to security – and the greatest opportunities – in the years ahead:

[Read more…]