I recently went to New York for the National Retail Federation Conference and I took a picture of all the devices (excluding my laptop) that I carried with me for use at the hotel, in the booth, and while I was at 30,000 ft.
As I think back about working with multiple devices (both issued to me and owned by me) during the week, here are some areas that impacted IT.
Reduce the risk of compromised company data by securing users’ smartphones
Once upon a time, a mobile phone was just a phone—you made and received calls on it, and that’s all. It posed zero risk to the security of your network or your business. Now, a mobile phone is so much more than just a phone. It’s a personal assistant, a portable game player, a digital camera, and most importantly, a full-fledged computer—and these smartphones definitely pose a security risk. Just like a laptop, smartphones, tablets, and other mobile devices can connect to your network, which means they could compromise your company’s data or leave your network vulnerable to attack from a hacker. You wouldn’t leave employees’ laptops unsecured, so why would you take chances with their mobile devices?
For the most part, the same security measures you ascribe to the computers on your network in the office should also be applied to mobile devices that have access to your LAN. Just like desktop PCs and laptops, all mobile devices need software protection to guard against malware and other attacks. Smartphones and tablets should have a firewall as well as antispam and antivirus software installed, such as the Cisco AnyConnect Secure Mobility Solution and Norton Smartphone Security offering.
Have you heard the news? 3D versions of the Star Warsmovies will begin rolling out in 2012. I know some sci-fi geeks…ah, friends…who can hardly wait.
Me, I prefer Force 3. I like to think of them as the living, breathing version of Star Wars. No Darth Vaders, no jittery C-3POs, but plenty of Luke Skywalkers—regular “heroes” intent on designing technology solutions with a relentless focus on meeting their customers’ business needs.
But what really grabs my attention in their video below is that Force 3 gets it, they truly do. As a thriving Cisco Master Partner, pushing products isn’t on their intergalactic radar— it’s not even within low-earth orbit.
So if it’s not selling gear, what’s Force 3’s strategy for success? Read More »
The Cisco 4Q11 Global Threat Report has been released. The report covers the period from 1 October 2011 through 31 December 2011 and features data from across Cisco Security Intelligence Operations. This quarter’s contributors were Cisco Intrusion Prevention System (IPS), Cisco IronPort, Cisco Security Research and Operations (SR&O), and Cisco ScanSafe.
It took me awhile to go through all the random Top 10 of 2011 lists for various topics, so now I’m ready to look ahead to 2012’s preponderance of pundit predictions. Or maybe I’m just fashionably late. I’ve tripped over a few reports here and there – some quite possibly developed by caffeinated squirrels on a treadmill.
Not me, but she looks like she's predicting something...
On the technology front, I found one more interesting than others. Instead of putting a small group of experts in a room and not letting them out until they agree on a list, Baseline Magazine annually surveys business and technology managers at companies with 100+ employees to ask about their organizations’ investments, plans, and strategies. Across several hundred respondents, patterns evolve.
Whoever these people are, coming from the desk I use, I like the way they (and their companies) think. Following – their predictions and my two cents (maybe three or four).