Archive for the ‘Mobile’ Category

The discussion on BYOD centers on whether employees working more efficiently on their personal devices is worth whatever network security vulnerabilities are sown when enterprises allow numerous devices and operating systems to access their networks. As a compromise between employees and employers that brings everyone onto the same page, a BYOD policy helps. But, it [...]

The Department of Homeland Security (DHS) issued a warning last week that the computer network of a public utility company had been compromised by a “sophisticated threat actor,” likely through a brute force password attack. Although the utility company repelled the attack, and there is no evidence that operations were affected, the DHS’ Industrial Control [...]

In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce strict working hours than they are today. After all, work wouldn’t get done if employees weren’t present. Mobile technology has since enabled the growing trend of remote work, [...]

Cybersecurity threats are constantly evolving, and for IT teams looking to patch the latest vulnerability (i.e. Heartbleed), trying to prevent the next attack is a full-time job in itself. However, it’s not very often that we have a chance to examine some tangible information about the threats we’re trying to safeguard against. That’s why research [...]

Over the last year, we’ve witnessed some very prominent hacks including Adobe, Target and Neiman Marcus, so enterprises could be forgiven for feeling a bit nervous about the ever-present threat of network infiltration. Unfortunately, a recent Ponemon Institute report will likely do little to ease these concerns. According to the research, the majority of security [...]