Tag Archives: BYOD

10 BYOD policy guidelines for a secure work environment

Bring your own device (BYOD) is no longer simply a buzzword BYOD-300x256or a new trend; it’s reality. And in that reality, almost half of all employees use their own devices to access corporate assets such as network drives, documents, printers, web proxies, social media sites, and personal cloud services. Malware, viruses, theft, unsecured devices, jailbroken devices, and a lack of control put corporate data, intellectual property, and client information at risk. The answer to this problem is to create, to manage, and to enforce BYOD policy guidelines to secure your work environment.
Continue reading

Mobile Will Revolutionize the Businesses of 2014

Guest post by: Kevin Millsap

At your favorite restaurant, a tablet greetsShopping Cart over a Tablet PC you and takes your order instead of a waitress. While shopping, your smartphone sends you an instant notification that the product you want is on sale. Instead of being locked in your cubicle, you are reviewing the spreadsheet your boss sent you on your smartphone at the top of a ski hill. These are just a few of the shifts mobiles will make to the business world in 2014. Continue reading

BYOD: Will it Be ‘Hit’ or ‘Miss’ at Your Workplace?

Encryption software: “yes”; Angry Birds: “no.” With pro-BYOD policiesWoman reading from a tablet now in place for a large percentage of all workplaces, a growing number of companies are facing new challenges for mobile security and enterprise applications, according to Tech Target. As more employers demand device agnosticism, small businesses must balance security concerns with the desire to offer employees greater device choice. But, BYOD is not necessarily a good choice for all companies; a pro-BYOD policy must fit a company’s business goals and the needs of its staff in order for it to be effective. Will BYOD be a “hit” or “miss” in your workplace? Consider the following pros and cons to find out. Continue reading

BYOD: 16 Rules to Avoid “Bring Your Own Disaster” [Infographic]

Written by: Christina Goggi

Productivity is what you want in your business; and productivity increases when your employees are happy in their  jobs. Giving them space and a level of freedom to use their own devices on the company network is one approach that shows trust– and that makes them happy. At the same time, you do not want that ‘freedom’ to negatively impact the hard work that went into standardizing and protecting your system.
Continue reading

Bring Your Own Device Without Worry Thanks to GFI LanGuard®

Written by: Christina Goggi

One of the big buzz words in IT for the past severalBYOD-devices-300x300 years has been BYOD (Bring Your Own Device). BYOD scenarios are starting to crop up everywhere, from small businesses all the way up to federal government agencies. One of the biggest challenges SysAdmins, security professionals and CIOs all face is how to secure these devices.

One trend that is growing in popularity involves the approach of “securing the data, not the device”. While that sounds great and should definitely be a part of your security strategy, if you think you can get away with securing your data while ignoring all those devices, you are only a breaking news story away from a very embarrassing situation. Defense in-depth strategies require you to secure more than just the data, and the devices your users use are a key component, whether you paid for them or they did.
Continue reading

51 Things You Need to Stop Doing Now

Written by: Christina Goggi

Here’s a list of 51 things you need to stop doing NOW. Parse this list, and if anything on it lines up with how things are done in your environment, stop it. Trust me on this. Each and every one of these things is bad, wrong, or even dangerous, and while it may seem like the simple thing to do right now, it is going to cost you much more in the long term.

1. Using default passwords

It takes 10 seconds to change the password on any device. Do it, or don’t be surprised when someone owns your access points, or your printers start to display “Insert Coins to Continue…”

2. Using password policies that are either too strong or too weak

Password length, complexity, and expiration requirements should strike a balance between security and functionality. A password that must be changed every 30 days is probably excessive, and will lead to admins ticking the box so their password never expires. Not requiring complexity makes it trivial to brute force or crack using simple dictionary methods. You should neither assume you won’t be a target, nor think you work for the NSA when setting the password policy for your users.

3. Forcing password patterns

Continue reading

95.6% of Commuters in the US put Company Data at Risk over Free Public Wi-Fi [Survey]

Written by: David Kelleher on September 19, 2013

Study reveals commuters regularly connect to freeFree-wi-fi-300x198, unsecure Wi-Fi services during their daily commute, putting personal and company data at risk every week.

We have some interesting findings of an extensive independent research project looking at end user use of mobile devices at work and in their daily commute to and from the workplace, which revealed that commuters are using free, unsecured and unknown Wi-Fi services for accessing sensitive company data in greater numbers.
Continue reading

Hackers Find the Internet a Target-Rich Environment Thanks to Poor Patch Management

You would think that with things like automatic updates, applicationshackers-poor-patch-management that can automatically patch themselves, and the constant media attention towards security, hackers would be a dying breed, bereft of targets which they can exploit. Unfortunately, poor patch management practices across the board means that the ever-growing number of connected devices are providing hackers with and endless supply of fresh victims. Continue reading