What’s Trending on Mobile Security?

As we’ve see over the last several years, mobile security continues to dominate the headlines and trade show chatter. So how is the conversation around mobile security taking shape, so far, in 2012– what’s new and what can expect? Here’s a round-up of what top security experts and thinkers are predicting. Anti-Theft Protection – “If mobile devices aren’t under attack to the extent that PCs are, mobile devices still carry a well-known security risk: they tend to get lost or stolen. That fact alone should be reason enough for businesses to take a more rigorous approach to securing mobile devices, including tracking them when they go missing, and ensuring that remote-wipe capabilities are in place should it be too difficult to recover the devices.”—Mathew J. Schwartz, journalist at InformationWeek. Mobile VPN – “A VPN that is designed to easily adapt to network changes and that enables seamless mobile roaming is the best option for teleworkers. Solutions should allow devices to automatically change between 3G/4G, Wi-Fi and LAN networks, for example, redirecting the VPN tunnel without interrupting mobile computing sessions. The VPN should also automatically recognize secure and unsecure networks, activating the appropriate firewall and security policies as needed.”—Rainer Enders, CTO Americas, NCP engineering. Malvertising – “Malvertising has been one of the banes of Web for years and it is starting to go mobile. Malvertising is when there are genuine looking ads that link back to fraudulent sites that can download malware to a device.”—Dan Rowinski, journalist at ReadWriteWeb. Sensitive Data Breaches – “Hackers are targeting mobile platforms not just because they can but also because these devices offer a...

What's Trending on Mobile Security?

As we’ve see over the last several years, mobile security continues to dominate the headlines and trade show chatter. So how is the conversation around mobile security taking shape, so far, in 2012– what’s new and what can expect? Here’s a round-up of what top security experts and thinkers are predicting. Anti-Theft Protection – “If mobile devices aren’t under attack to the extent that PCs are, mobile devices still carry a well-known security risk: they tend to get lost or stolen. That fact alone should be reason enough for businesses to take a more rigorous approach to securing mobile devices, including tracking them when they go missing, and ensuring that remote-wipe capabilities are in place should it be too difficult to recover the devices.”—Mathew J. Schwartz, journalist at InformationWeek. Mobile VPN – “A VPN that is designed to easily adapt to network changes and that enables seamless mobile roaming is the best option for teleworkers. Solutions should allow devices to automatically change between 3G/4G, Wi-Fi and LAN networks, for example, redirecting the VPN tunnel without interrupting mobile computing sessions. The VPN should also automatically recognize secure and unsecure networks, activating the appropriate firewall and security policies as needed.”—Rainer Enders, CTO Americas, NCP engineering. Malvertising – “Malvertising has been one of the banes of Web for years and it is starting to go mobile. Malvertising is when there are genuine looking ads that link back to fraudulent sites that can download malware to a device.”—Dan Rowinski, journalist at ReadWriteWeb. Sensitive Data Breaches – “Hackers are targeting mobile platforms not just because they can but also because these devices offer a...

What We’re Reading, Week of 5/21

Network World– Sales of unused IPv4 addresses gathering steam Byte – Why IBM Turned Off Siri (and Dropbox and Lots Of Other Things) CIO– Why Office for iPad is Inevitable Scripps Howard News Service – Defense Workers Try Securing a New Way to...

What We're Reading, Week of 5/21

Network World– Sales of unused IPv4 addresses gathering steam Byte – Why IBM Turned Off Siri (and Dropbox and Lots Of Other Things) CIO– Why Office for iPad is Inevitable Scripps Howard News Service – Defense Workers Try Securing a New Way to...

The State of Healthcare Security Breaches

By Sylvia Rosen Security breaches in are, no doubt, terrible for business owners. But when dealing with the healthcare sector, these breaches intensify in their potential for causing humiliating, or potentially, dangerous ramifications. In 2010, 42,275 people were affected by stolen, paper healthcare records, encouraging hospitals to make the switch to electronic health records. Still, industry experts say that electronic health records are still at risk from security breaches if they aren’t handled with care. Kroll Advisory Solutions found that the frequency of healthcare data breaches has increased steadily over the past six years, and the main cause is a lack of training and awareness among staff. “Human error by employees was a major factor in health breaches, according to respondents [in the 2012 Kroll/HIMSS Analytics Report]. Of the respondents, 79% said security breaches were initiated by an employee, and 56% said breaches occurred because employees had unauthorized access to information.” – Brian T. Horowitz, health writer at eWeek. “Any server or other data warehouse with patient health information must be securely protected. The expanded use of mobile devices offers new operational efficiencies and increased vulnerabilities. Security steps for mobile devices should be included in the action plans so that guidelines are set.” – Lisa Gallagher, senior directory of privacy and security for HIMSS. “Another significant takeaway [from the 2012 Kroll/HIMSS Analytics Report] is that mobile devices might be great for giving clinicians information at the point of care – but they’re not so good at keeping PHI safe. Nearly a third (31%) of respondents indicated that information available on a portable device was among the factors most likely to cause...