It was a dark, cold, and scary night when I returned from dinner with friends and noticed that my mobile phone was missing. It had corporate sensitive data such as emails, calendar events, and documents, as well as personal data (including pictures, videos and other documents). Well, let me be honest with you, I didn’t really lose my phone. However, many cell phones, tablets, and other gadgets are lost or stolen on a daily basis. The problem of stolen mobile devices is huge. According to a report from the Federal Communications Commission (FCC) earlier this year, about 40 percent of robberies in Washington, D.C., New York, and other major cities now involve mobile devices. The FCC has teamed up with the nation’s top wireless carriers, including AT&T, Verizon, T-Mobile, and Sprint, to develop a database of stolen mobile devices.
Allowing employees to access corporate email, critical business applications and data makes workers more productive and effective. Finding just the right balance when allowing easy access to the applications that users need to be more productive, while maintaining the integrity and security of enterprise resources, will give your organization a competitive advantage.
Stolen and lost devices are among the many challenges of mobile device security.
Read More »
Tags: Bring your Own Device (BYOD), data_protection, Identity Services Engine, mobile data, mobility, security
Keeping up-to-date on new threats and software updates is critical to maintaining a secure network
You’ve installed a firewall and intrusion prevention system (IPS) to secure the perimeter of your small business network. You’ve configured your protection measures to filter dangerous traffic, secure remote access, and control who can access your network. You’ve added antivirus and antimalware software to every computer and laptop in your organization. Your business is now safe from attackers lurking on the Internet, right?
Well, yes, for now. But if you don’t keep up with the constantly changing world of security vulnerabilities, your network won’t stay locked down for long.
New network vulnerabilities and security attacks are continually cropping up. Technology vendors discover new holes and release patches to their products’ firmware and software on a regular basis. But attackers are moving just as fast to exploit those holes and invent new ways to break into your network.
There are three ways you can stay on top of this moving target. Depending on how comfortable you are handling your network security, you can take a completely DIY approach by following vendors’ advisories, subscribe to a service that will inventory and automatically update your software, or contract with a security professional to manage security updates for you.
Read More »
Tags: data_protection, network_security, security, security_updates, small_business