Cloud files deleted from smartphones “can be recovered”

Recent research from the University of Glasgow has revealed that, if you delete a file from a piece of cloud software, it isn’t completely gone.

The experiment took two smartphones, an iPhone 3G on iOS 3 and an HTC Desire on Android 2.1, and three cloud storage facilities; Dropbox, Box and SugarSync, with the researchers putting together a 20 file data set comprising MP3, MP4, JPG, DOCX and PDF files.

“Using mobile forensic toolkits, data can be recovered from a smartphone device which has...

By James Bourne, 28 March 2013, 0 comments. Categories: BYOD, Cloud , Security.

Analysing network insecurity after developer outsources job to China

By Edy Almer, Vice President of Business Development

Critical infrastructure developer who outsourced his job to China: a worst-case illustration of network insecurity or closer to the norm?

Earlier this year Verizon reported a network breach where a top developer at a critical infrastructure company outsourced his job to Chinese programmers to whom he sent his two-factor authentication card.

At the time it seemed to me that this was an outlier example that painfully illustrated the network access security...

By Wave Systems, 21 March 2013, 0 comments. Categories: Enterprise Mobility, Mobile, Security.

BlackBerry denies reports BB10 is unfit for government use

Not all stories are the same of course, but every so often there comes a story based on a story that never was.

This turned out to be the case when The Guardian published an article on March 19 (now removed, so clicking the link will only lead you to a 404) headlined “BlackBerry software ruled not safe enough for essential government work”.

In the article, it was reported that after BlackBerry 7.1 was...

By James Bourne, 21 March 2013, 0 comments. Categories: BlackBerry, BYOD, Enterprise Mobility, Security.

15% of organisations don’t use BYOD, says ThreatMetrix

A new report from ThreatMetrix has revealed that 25% of retail and financial services are involved with BYOD, but 15% of companies don’t have anything concrete in place.

Again, the first question to ask when these reports come out is “where’s the source?” ThreatMetrix is a cybercrime prevention company, so with a paper entitled “IT Security and Online Fraud Prevention”, it’s perhaps not a surprise that these figures appear as they are.

However, the bare statistics...

By James Bourne, 14 March 2013, 0 comments. Categories: BYOD, Enterprise Mobility, Security.

More workplace device security woes, according to ICO

A UK-based study from the Information Commissioner’s Office (ICO) has detailed a “laissez-faire” attitude to personal device policies which could lead to corporate network weaknesses, and gives a series of best practice BYOD tips for companies looking to ‘consumerise’.

According to the research just under half (47%) of all UK adults incorporate BYOD, yet fewer than three  in 10 of those who use personal devices for work are given appropriate guidance and contingency...

By James Bourne, 08 March 2013, 0 comments. Categories: BYOD, Enterprise Mobility, Security, Tablet.

McAfee survey highlights alarming mobile security procedures

IT security provider McAfee, in partnership with One Poll, has released a report detailing how one in three smartphone users don’t password protect their devices.

According to the research, 36% of respondents don’t lock their mobile devices with either PIN or password, while nearly one in three (30%) have vital password information stored in notes apps.

“The unfortunate reality is that everyone loses things, and our devices can get stolen,” Robert Siciliano, McAfee identity theft...

By James Bourne, 07 March 2013, 1 comment. Categories: Infographic, Mobile, Security.

Samsung hones its enterprise mobility focus with KNOX launch

Samsung unveiled the next phase of its program to make its Android smart devices fit for enterprise deployment with the announcement of KNOX. KNOX provides an end-to-end package of security services that reach from the hardware to the application layer. These include a secure “application container”, which is similar to BlackBerry’s Balance, plus support for over 300 IT policies and more than 700 mobile device management application programming interfaces.

KNOX demonstrates Samsung’s growing appreciation...

By Ovum StraightTalk, 27 February 2013, 0 comments. Categories: CIO, Enterprise Mobility, Mobile, Samsung, Security.

IBM expands MobileFirst initiative to protect iOS enterprise apps

Tech giant IBM is rolling out enhanced enterprise security software, in the shape of IBM AppScan Source 8.7 for iOS, helping keep Apple apps and devices safe.

This is another indication that IBM, expanding on its MobileFirst initiative, is strengthening its mobile plays, having made 10 acquisitions in the mobile realm since 2006.

Part of the software’s appeal, according to IBM, is that it can automatically identify the path of data in an application, how it enters and leaves.

The problem of data leakage is an...

By James Bourne, 22 February 2013, 0 comments. Categories: CIO, Development, Enterprise Mobility, iOS, Security.

Win8 Surface Pro: The end of passwords?

By Edy Almer, VP of Business Development

Just recently, the email accounts of former U.S. president George W. Bush, his father George H.W. Bush and several other family members and friends were broken into, and private details exposed.

In the past three months, attacks against U.S. credit unions, many different companies, and the heightened prominence of phishing attempts should prompt IT departments to explore ways to more easily move their users into 'no more passwords' territory.

In the past,...

By Wave Systems, 18 February 2013, 0 comments. Categories: Enterprise Mobility, Microsoft, Security, Tablet.