New research shows importance of visibility in mobile device strategy

A lack of visibility into devices and networks is putting businesses at risk of cyberattacks, according to a new report.

The study, put together by Enterprise Mobility Exchange and NetMotion Software and which polled more than 130 respondents at organisations with corporately owned mobile devices, explored employees' relationships with their devices and networks.

Almost half of mobile workers polled said they spent the majority of their working time connected to non-corporate public Wi-Fi and carrier...

By James Bourne, 15 October 2018, 0 comments. Categories: Data Loss, Employees, Enterprise Mobility, Research, Security.

Is there room left for privacy in the digital world?

Just as Native Americans sold the island of Manhattan to colonial governor Peter Minuit for $24 worth glass beads - at least, that’s what the legend says - people are now selling out their private data for “glass beads” to Facebook and Google. For data drilling companies, profit comes first, privacy last. They sacrifice everything for growth and engagement for their platforms in order to collect as much data as possible to profiteer from advertising.

Is there anything we can do about...

By Istvan Lam, 09 October 2018, 0 comments. Categories: Employees, Privacy, Security.

New York cybersecurity fund shows importance of investing in people rather than technology

It seems rather appropriate that the constant surveillance against cyber attack is being championed by the city that never sleeps.

The NYCEDC (New York City Economic Development Corporation) aims to place the city as the leader in security with the Cyber NYC initiative - and up to $100 million in investment. $30m will come from the city, alongside up to an additional $70m from private funding, to put together a series of initiatives. 

Jerusalem Venture Partners (JVP) has been appointed to establish the...

By James Bourne, 08 October 2018, 0 comments. Categories: CIO, Employee Education, Employees, Security.

The current state of enterprise mobile: Seven trends increasing complexity

Just two years ago, enterprise mobile began to replace the dominant siloed approach of deploying mobile one department or business unit at a time, with a new enterprise-wide orientation. As a result, scalable, organisation-wide deployments of mobile are now the norm. Mobile began to be valued as a transformative catalyst for business. Enterprises combined mobile assets with cloud-based applications and business intelligence tools to pull from mobility previously hidden business insights.

With mobility...

By Marco Nielsen, 08 October 2018, 0 comments. Categories: Applications, Employees, Enterprise Mobility, Security.

Deflecting DDoS: Key tactics in the battle against IoT-powered attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline.

The bank issued a statement acknowledging the attack and stating that “no damage” had been done and its operations, as a central bank with no commercial arm, were not affected, implying that the attack was not successful. Meanwhile, the hacktivist group, Anonymous Catalonia, claimed responsibility...

By Ronald Sens, 03 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Mobile, Security.

Hyperledger and Enterprise Ethereum Alliance team up to push forward enterprise blockchain

If blockchain technologies are going to seriously infiltrate the enterprise, then an endorsement from two leading industry players would not go amiss. The Enterprise Ethereum Alliance (EEA) has teamed up with Hyperledger to seemingly do just that.

The two bodies are chumming up by becoming associate members within each other’s organisations. This is somewhat interesting in itself; the EEA naturally aims to focus on...

By James Bourne, 02 October 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

The insider threat: Making user errors a thing of the past

It’s a feeling that most of us have experienced at some point: the heart-stopping, head-in-hands moment when you realise that you have copied the wrong person into a sensitive email or attached the wrong file and shared confidential data with unauthorised recipients. Once that data is out there, there is often little you can do except to politely request that the recipient deletes the email and hope that they comply. In today’s world of rigorous data protection legislation, this is simply not...

By Tony Pepper, 25 September 2018, 0 comments. Categories: Employee Education, Employees, Security.

How AI and machine learning can help detect and fight against cyberattacks

New research conducted by the Ponemon Institute argues that IT security teams need both a new approach and powerful new tools to protect data and other high-value assets, as companies struggle to fight against sophisticated cybersecurity attacks.

For this study, conducted on behalf of Aruba, a total of 4,000 security and IT professionals across the Americas, Europe and Asia were surveyed to understand what makes security deficiencies so hard to fix, and what types of technologies and processes are required to...

By Enterprise CIO, 20 September 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

Building trust in a ‘zero trust’ environment: A more dynamic security model

Today’s working environments are no longer governed by the perimeters and boundaries they once were.  As a result, security threats have multiplied and the pressure on IT teams to protect data has increased rapidly. Modern work happens in a mobile-cloud environment outside traditional security controls, and from the perspective of those controls it’s a zero trust environment.

As attacks become more sophisticated, security professionals are forced to reconsider the best practices on which...

By Ojas Rege, 17 September 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

This enterprise secure messaging platform – with zero knowledge architecture – may be a Keeper

Worried that your organisation’s messaging tools aren’t up to scratch security-wise? Keeper Security may have the answer.

The Chicago-based security vendor has announced that KeeperChat, its secure chat and private messenger platform, is now available at SMB and enterprise level.

The platform, available on Windows, Mac OS, Android and iOS, was originally launched in March,...

By James Bourne, 14 September 2018, 0 comments. Categories: Collaboration, Employees, Enterprise Mobility, Security.

Enterprises waiting months for security updates may cause concern in ‘as a service’ future

Revamping an enterprise’s IT security is never going to be a simple flick of a switch. Yet for more than a quarter of organisations polled by enterprise software provider Kollective, it will take at least a month before vital updates are installed.

The study, which polled 260 IT managers, found that for almost two in five (37%), not installing updates is seen as the biggest security threat this year, with outdated...

By James Bourne, 22 August 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Is two-factor security no longer enough for organisations?

The news that Reddit has become the latest high-profile company to suffer a data breach raises some important security questions, particularly in relation to employees.

In this incident Reddit used SMS-based authentication, which, while still two-factor, is less secure than other methods. The SMS codes were intercepted by hackers who were then able to access some data.  

By Ojas Rege, 20 August 2018, 0 comments. Categories: Employee Education, Employees, Enterprise Mobility, Security.

Employees who see compliance violations twice as likely to leave, says Gartner

Employees who see misconduct or a compliance violation at work are twice as likely to leave their organisations, according to a new study from Gartner.

The survey, which sampled more than 5,000 employees at various levels, found that 29% of employees saw at least one compliance breach at work in 2016 and 2017. Of these sampled employees, 59% were actively looking for another job due to a compliance violation. This was compared with...

By James Bourne, 13 August 2018, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Security.

How to combat daily security threats within the healthcare sector

Last year, we saw one of the most aggressive ransomware attacks on healthcare institutions around the world. WannaCry went viral on May 12, causing widespread disruption to global IT systems and raising serious questions about the preparedness of the National Health Service to deal with such incidents.

According to the NAO’s published report earlier this...

By Anthony Perridge, 07 August 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, IoT, Security.

The risk of ransomware: How to avoid becoming a victim

Since it made more frequent waves in the headlines in waves in 2017, ransomware – which allows hackers to commandeer a company’s data and hold it under password protection until a ransom is paid – has become one of the most feared and profitable weapons in a cybercriminal’s arsenal. More and more hackers are turning to ransomware because it delivers them the best bang for their buck. Small and medium-sized businesses (SMBs) are particularly vulnerable to this...

By Mark Banfield, 02 August 2018, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

Check Point upgrades mobile security solution ‘SandBlast Mobile 3.0’

SandBlast Mobile 3, one of the leading mobile threat defence solutions owned by Israeli firm Check Point, has been enhanced with some on-device technology that prevents malicious malware, botnets, and phishing attacks on all mobile applications.

The solution has established a benchmark in terms of new mobile security with on-device network threat prevention.

SandBlast Mobile has been upgraded with important features that now prevent phishing attacks on applications, keeps away from browsing to malicious...

By Enterprise CIO, 27 July 2018, 0 comments. Categories: Security.

CIOs want cloud, cybersecurity and AI – but not all confident their IT is up to it

Data analytics, cloud and cyber security are the key technologies for CIOs today – but a fair proportion are looking at artificial intelligence (AI) and machine learning.

That is the primary finding from a study by Trace3, a provider of, well, cloud, cybersecurity, and machine learning software. Never mind that however – the statistics from the study, which featured more than 200 responses from the C-suite, as well as vice presidents and directors, are still...

By James Bourne, 25 July 2018, 0 comments. Categories: CIO, Cloud , Data & Analytics, Security.

Industries still ‘in the middle’ when it comes to cybersecurity implementation, Gartner finds

Even though 95% of CIOs expect cyber threats to increase over the next three years, only two in three (65%) organisations currently have a cybersecurity expert.

That’s the key finding from analyst firm Gartner, who polled 3,160 CIO respondents across all major industries that represent approximately $13 trillion in revenue and public sector budgets and $277 billion in IT spending.

The survey also found that skills challenges continue to plague organisations that adopt digitalisation, with digital...

By Enterprise CIO, 23 July 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Facebook Messenger and WhatsApp Messenger top blacklisted enterprise app list again

Facebook Messenger and WhatsApp Messenger have got plenty of fans – but not so much in the enterprise as they continue to be blacklisted.

That’s the key finding from the latest quarterly report from enterprise mobile security provider Appthority. The study, the Enterprise Mobile Security Pulse Report for Q218, is based around the millions of scans the company performs for its customers, and found WhatsApp and Facebook to be similarly popular – and unpopular from a security view – for...

By James Bourne, 19 July 2018, 0 comments. Categories: Applications, Enterprise Mobility, Security.