Take the risks for reward of BYOD, says new report

Mobile security provider Symantec, in its latest survey, has concluded that bring your own device (BYOD) is worth the risks, despite the well-known security scare stories.

The survey, which interviewed 236 attendees of the company’s Symantec Vision event, examined the risks and rewards of bring your own device, including management strategies and usage policies.

Yet the key question in assessing whether mobility is the best route forward for companies was when Symantec asked its respondents ‘Do...

By James Bourne, 29 April 2013, 0 comments. Categories: BYOD, Enterprise Mobility, Mobile, Security.

Farewell privacy - CISPA is back

Later this week, a bill by the name of ‘CISPA’ (Cyber Intelligence Sharing and Protection Act) is being brought back from the grave after getting unceremoniously ditched last year. The bill is being “reworked” before voting at a closed hearing by The House Intelligence Committee on Wednesday.

The basis of the bill loosens restrictions which prevent organisations sharing your data amongst security investigators –

By Ryan Daws, 25 April 2013, 0 comments. Categories: Enterprise Mobility, Security.

What are the top 5 trends in BYOD and mobile security?

The LinkedIn Information Security group has conducted a survey of its members, and found that employee satisfaction remains the number one driver of a personal device policy, as well as concluding that iOS is the number one BYOD platform.

Reponses from the 160,000-strong group owned by Holger Schulze has resulted in the BYOD & Mobile Security report, and has come up with five main takeaways:

  • The biggest benefit of BYOD is greater employee satisfaction and productivity
  • A majority of companies are concerned about data loss and unauthorised access to data
  • Encryption is the most popular risk...

By James Bourne, 23 April 2013, 0 comments. Categories: BYOD, Enterprise Mobility, Research, Security.

The next generation of smartphones: What do you want to see?

Here at 3Squared, we are always eagerly awaiting the release of the next must-have phone.  Apple’s strategy of seemingly random launches, without even staff and retailers knowing what new features it may have, creates huge amounts of attention and their power in the technology market suggest this approach works.

But regardless of what features it does have, there is always much debate in the office about what the manufacturer has missed off.  We decided to take a look at the features that we...

By 3Squared, 17 April 2013, 0 comments. Categories: iOS, Security.

Examining the best ways to keep your network safe

Security provider Symantec has outlined the top five mistakes users make by leaving themselves open to hackers.

Whilst some of the policies are pretty standard fare, like enforcing stricter password policies, some may be overlooked, such as not educating employees on social media and online behaviour.

Symantec recently looked at other facets of the enterprise space, most prevalently examining how to create a successful BYOD policy back in...

By James Bourne, 28 March 2013, 0 comments. Categories: Employees, Enterprise Mobility, Security.

Cloud files deleted from smartphones “can be recovered”

Recent research from the University of Glasgow has revealed that, if you delete a file from a piece of cloud software, it isn’t completely gone.

The experiment took two smartphones, an iPhone 3G on iOS 3 and an HTC Desire on Android 2.1, and three cloud storage facilities; Dropbox, Box and SugarSync, with the researchers putting together a 20 file data set comprising MP3, MP4, JPG, DOCX and PDF files.

“Using mobile forensic toolkits, data can be recovered from a smartphone device which has...

By James Bourne, 28 March 2013, 0 comments. Categories: BYOD, Cloud , Security.

Analysing network insecurity after developer outsources job to China

By Edy Almer, Vice President of Business Development

Critical infrastructure developer who outsourced his job to China: a worst-case illustration of network insecurity or closer to the norm?

Earlier this year Verizon reported a network breach where a top developer at a critical infrastructure company outsourced his job to Chinese programmers to whom he sent his two-factor authentication card.

At the time it seemed to me that this was an outlier example that painfully illustrated the network access security...

By Wave Systems, 21 March 2013, 0 comments. Categories: Enterprise Mobility, Mobile, Security.

BlackBerry denies reports BB10 is unfit for government use

Not all stories are the same of course, but every so often there comes a story based on a story that never was.

This turned out to be the case when The Guardian published an article on March 19 (now removed, so clicking the link will only lead you to a 404) headlined “BlackBerry software ruled not safe enough for essential government work”.

In the article, it was reported that after BlackBerry 7.1 was...

By James Bourne, 21 March 2013, 0 comments. Categories: BlackBerry, BYOD, Enterprise Mobility, Security.

15% of organisations don’t use BYOD, says ThreatMetrix

A new report from ThreatMetrix has revealed that 25% of retail and financial services are involved with BYOD, but 15% of companies don’t have anything concrete in place.

Again, the first question to ask when these reports come out is “where’s the source?” ThreatMetrix is a cybercrime prevention company, so with a paper entitled “IT Security and Online Fraud Prevention”, it’s perhaps not a surprise that these figures appear as they are.

However, the bare statistics...

By James Bourne, 14 March 2013, 0 comments. Categories: BYOD, Enterprise Mobility, Security.