5 ways BYOD can harm your company

It's becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient - employees can access important documents at home or on the road - it also creates greater security risks for businesses.

Employees’ devices may not be secure

Many employees’ devices have operating systems that are vulnerable to hacking attacks or viruses. This is especially true if the...

By Michelle Drolet, 18 January 2013, 0 comments. Categories: Big Data, BYOD, Enterprise Mobility, Security.

Gartner survey examines CIO agenda in the enterprise

A global survey of CIOs by analyst house Gartner has revealed that mobile technology is forecast to be the most disruptive technology in the enterprise over the next 10 years.

The study, entitled ‘Hunting and Harvesting in a Digital World’ and produced by Gartner Executive Programs, polled over 2000 CIOs amounting to over $230bn (£143.6bn) in IT budgets. And according to the CIOs polled, mobile has a huge part to play in disrupting the current IT landscape.

It’s perhaps unsurprising,...

By James Bourne, 17 January 2013, 0 comments. Categories: Big Data, CIO, Cloud , Enterprise Mobility, Mobile.

6 ways to keep your data safe over the holiday season

GFI Software, a security software provider, has offered a stark warning for those enjoying an extended break over the holiday period: make sure your network is as robust as possible over the holiday season otherwise you could be at risk to cyber criminals.

Of course, with the festive season upon us, the vast majority of offices close down leaving IT operations unmanned for around a week – and as a result, systems could be hacked as a result.

And GFI Software anticipates bring your...

By James Bourne, 18 December 2012, 0 comments. Categories: Big Data, BYOD, Security.

Top 10 data disasters show importance of device strategy

A woman who gave her hard drive a spin in her washing machine, a man who performed a hit and run on his camera and an iPad which took an impromptu swim in the Gulf of Guinea were just some of the catastrophes which made Kroll Ontrack’s end of year data disaster list.

The ninth annual ‘top 10 data disasters’ list from the data recovery expert found amusing, shocking and just plain baffling stories relayed to Kroll Ontrack engineers throughout the course of the...

By James Bourne, 28 November 2012, 0 comments. Categories: Big Data, Employees.

What are your security concerns for the coming year?

The big security themes for 2012 were mobile device and application protection, lack of cloud-based security, data-loss prevention, and the need for Big Data management. If advanced protection requirements and increasing compliance demands are added to the equation, most of these issues will continue to retain a strong influence over proceedings during 2013 and beyond. The thing that is changing is what security professionals believe about the way in which these issues should be addressed.

There is an urgent...

By Ovum StraightTalk, 23 October 2012, 0 comments. Categories: Big Data, BYOD, Cloud , Security.

Which Apps Suck More Data?

Android Eating DataData, data, data, it’s been in the news a lot lately. From carriers throttling “unlimited” plans to the ads in free apps using up more...

By Mike Brown, 22 March 2012, 0 comments. Categories: Big Data.