Securing Passwords in Business: What You Really Need To Know

Another week, another breach! It seems like every week we’re hearing about another major website’s secure passwords being compromised. Personal information is either being leaked for malicious purposes, or hackers are showing off their prowess for accessing “secure” information.

Last week 3 major websites reported their customer passwords were compromised:

If you have an account on any of these sites, it is highly recommended that you change your password immediately. Also no funny business: make sure that you use a different password on each of them.

Imagine someone contacting your business relationships. Or using your identity to manipulate business relationships you have spent time building. Or just as bad, manipulating personal relationships you are developing. When you use the same password for most of your services (including work systems) you make it very easy for someone to get into many – or all – of them.

Here are my recommendations for password management best practices to reduce your risk of exposure.

[Read more…]

Little known ways of managing mobile devices to prevent data loss

This article originally appeared on Stephen’s personal blog. You can visit it here. 

Most people feel naked without their smart phones and tablets. The adoption rates of these devices over the last five years have been explosive with an expected 10 billion by 2020, according to Morgan Stanley  (to give you an idea of the magnitude – PCs and notebooks are at about 1 billion today.) Morgan Stanley also predicts that 95% of devices purchased for business will be by employees. This means that there will soon be a diverse selection of mobile devices in the office (for example right now Softchoice’s Employee Choice model has brought hundreds of iPhones into our environment.) How is IT going to cope with this?

Device heterogeneity is a serious issue.  Similar versions of Apple’s IOS Operating System run on iPod, iPhone, and iPad devices. Android has been modified by several vendors including Samsung, HTC, and Motorola. HP recently introduced new versions of WebOS that run the Palm Pre3 and TouchPad.  RIM has also introduced the Playbook that works with Blackberry devices. Is your head spinning yet?

All of this heterogenity has left network administrators confused about how to apply one of the most fundamental principles to these devices: centralized management. Lack of centralized control and updating is an architecture built for an individual, not an enterprise. Centralized management of mobile devices is crucial as part of a Data Loss Prevention program because of they are easily lost, stolen, (and likely soon to be) compromised. 

Here are seven little known ways to implement a Mobile Device Management solution: [Read more…]