A guide: How to better manage your personal information

Today, information is being collected at a rapid pace. If you don't take the right steps to protect your information, you could suffer from a breach that would endanger your private banking and other personal information. Therefore, you need to manage it with the right tools and strategies. But this can seem overwhelming at first.

Luckily, it doesn't have to be. If you use the advice below you can have peace of mind and be efficient while using your information in the best way possible.

IT

The first...

By Rick Delgado, 20 February 2018, 0 comments. Categories: Big Data, CIO, Employees, Security.

Gartner identifies seven steps to bring down risk of security threats from Spectre and Meltdown

It is beneficial for leaders in the security and risk management field to adopt a pragmatic and risk-based approach to deal with the ongoing security threats posed by the "Spectre" and "Meltdown” vulnerabilities, according to Gartner.

Gartner identifies seven steps that security and risk heads can follow to bring down the risks associated with security threats.

Almost all modern IT systems are at risk of security threats so all desktops, mobiles, servers, virtual machines, IoT devices and...

By Enterprise CIO, 16 February 2018, 0 comments. Categories: CIO, Privacy, Security.

Lack of knowledge around biometrics apparent – but could they be coming to a workplace near you?

A new piece of research from employee software provider TSheets shows a worrying lack of knowledge around what biometric data represents – and concern over how it may be used.

The survey collated responses from 500 US residents and asked them what they thought contained biometric data. The answers offered to respondents were DNA, facial photographs, fingerprints, hand geometry, iris scan, and retina scan. Of course, participants should have selected all of those options – but 37.3% opted for...

By James Bourne, 08 February 2018, 0 comments. Categories: Authentication, Employee Education, Employees, Identity, Security.

MobileIron and Google Cloud partner on enterprise cloud services for operators

Enterprise mobility management (EMM) provider MobileIron and Google Cloud have announced they are to collaborate on a new end-to-end platform for enterprise cloud services.

The two companies will combine Orbitera, a cloud commerce platform which Google Cloud acquired in 2016, with MobileIron’s app distribution, security, and analytics. The proposed result will be aimed at operators and enterprises, with potential features including customised bundles and customised branding.

As MobileIron sees it, the...

By James Bourne, 30 January 2018, 0 comments. Categories: Enterprise Mobility, Marketing, Security.

Latest Okta report showcases increased enterprise need for security apps and tools

The latest Businesses @ Work report from identity management provider Okta has revealed many of the fastest growing apps in the enterprise are based around security – and suggests that GDPR may be behind the renewed push.

Of the 15 fastest growing apps in the Okta network last year, seven were based around security. These were, in order of popularity, Jamf, KnowBe4, Cisco Umbrella, DigiCert, Sophos, Mimecast and CloudFlare.

Writing in an official company blog, Okta CEO Todd McKinnon argues that the...

By James Bourne, 24 January 2018, 0 comments. Categories: Applications, Enterprise Mobility, Security.

Mobile mitigations for Meltdown and Spectre: A guide

Meltdown and Spectre are two critical vulnerabilities recently identified in modern processors. These vulnerabilities can allow unprivileged users to access memory belonging to other processes, including the kernel.

Much of the initial coverage of these vulnerabilities centred on desktop, server, and cloud systems, but they affect mobile devices as well. Apple, Google, Linux distributions, and Microsoft are now releasing patches to mitigate these issues.

How the exploits work

Meltdown and Spectre are hardware...

By Ojas Rege, 22 January 2018, 0 comments. Categories: App Platforms, Data Loss, Enterprise Mobility, Security.

Only 4% of enterprise mobile devices protected against Meltdown and Spectre vulnerabilities

The fallout from the Meltdown and Spectre vulnerabilities is going to be painful, long-ranging and expensive – the latter in more ways in one. Yet according to new research published by Bridgeway, companies are not exactly getting a jumping start on reparation.

Bridgeway, through anonymously analysing 100,000 mobile devices through its mobile management reporting tool, IronWorks found that only 4% of enterprise mobile devices had been patched against the threats. In all, at least 72% of devices are...

By James Bourne, 16 January 2018, 0 comments. Categories: Enterprise Mobility, Security.

Why IoT DDoS threats continue to loom in emerging new tech

There’s a flood of connected devices making their way into our homes and businesses – a deluge exacerbated by recent holiday gifts and the latest and greatest from CES, where connected devices always take top billing.

From mobile, wearables and car technology to advancements in smart homes, TVs and cameras, the tech world is awash with internet-connected devices. By 2020, it’s estimated that there will be more than 30 billion

By Ronald Sens, 15 January 2018, 0 comments. Categories: Data & Analytics, Enterprise Mobility, IoT, Security.

Verizon furthers security detection and response services with Niddel acquisition

Verizon has announced the acquisition of Niddel to further its managed security detection and response capabilities for business customers.

Niddel’s machine-learning-based automated threat hunting technology and services will be integrated into Verizon’s existing offerings. Financial terms of the acquisition remain undisclosed.

Alexander Schlager, executive director for security services at Verizon, said: “Using machine learning to improve information accuracy significantly reduces false...

By Enterprise CIO, 10 January 2018, 0 comments. Categories: IoT, Security.

Why mobile devices should never be 'trusted'

Enterprise mobile device adoption has soared in recent years, due to the realisation that enabling a mobile workforce benefits productivity and can improve employee retention. Despite these positives, unrestricted access to company data creates a host of security risks, such as data exfiltration and unwarranted access to confidential data.

In a bid to secure corporate devices from these risks, many IT teams have turned to the ‘trusted’ device security model. But this method of securing devices is...

By Mike Schuricht, 10 January 2018, 0 comments. Categories: BYOD, Enterprise Mobility, Security.

Tinder, Pokémon GO and Instagram among most frequently blacklisted enterprise apps

Are you in the habit of swiping right at work? According to the latest report from enterprise mobile security provider Appthority, Tinder is now among the apps most blacklisted by enterprise mobility and security teams.

The study, which uses data based on millions of mobile security scans Appthority performs for its customers each quarter, found Tinder to be the third most frequently blacklisted iOS app; not so much because it wastes valuable company time, but because it is able to send SMS messages.

The top...

By James Bourne, 10 January 2018, 0 comments. Categories: Applications, Enterprise Mobility, Security.

42Gears moves up to include unified endpoint management in latest offering

42Gears, an enterprise mobility solution provider based in India, has announced the launch of a unified endpoint management (UEM) offering to move beyond standard mobile device management (MDM) and enterprise mobility management (EMM).

As the company’s website outlines, the UEM offering supports all OS types, as well as a wide variety of devices, from desktops and laptops, to ruggedized devices and IoT devices, to kiosks and printers. The product “takes away ineffective multi-platform dependencies...

By James Bourne, 08 January 2018, 0 comments. Categories: Enterprise Mobility, IoT, Security.

Cisco makes Security Connector app available to provide greater enterprise iOS security

Cisco’s Security Connector for iOS, a tool which aims to give enterprises deep visibility and control over network activity on Apple devices, is now generally available.

A blog post confirmed the news, which was first announced in June when Tim Cook, Apple CEO, took to the stage alongside Cisco CEO Chuck Robbins to discuss...

By James Bourne, 15 December 2017, 0 comments. Categories: Enterprise Mobility, iOS, Security.

Malicious and imitation apps continue to proliferate – so how can your organisation stay safe?

It has been a tough quarter when it comes to application security, according to RiskIQ’s latest mobile threat landscape report, with an increase in malicious apps flooding the marketplace, new mobile botnets, and imitation and trojan apps making it through official app store borders.

The report, which analysed 120 mobile app stores and more than two billion daily scanned resources, found that Google’s percentage of malicious apps fell to a low of 4% this quarter, having been at 8% in Q2. Yet this...

By James Bourne, 12 December 2017, 0 comments. Categories: Authentication, Employees, Enterprise Mobility, Research, Security.

Worldwide security spending to hit $96bn in 2018, says Gartner

Global security spending will hit $96.3 billion in 2018 at an increase of 8% from this year, according to the latest figures from Gartner.

The analyst firm puts security spending for 2018 into five buckets; security services, which comprises the majority (60%) of the overall market, followed by infrastructure protection (18.1% market share at $17.5bn), network security equipment (12.1% share at $11.7bn), consumer security software (4.9%, $4.7bn) and identity access management (4.9%, $4.7bn).

To give an...

By James Bourne, 11 December 2017, 0 comments. Categories: Enterprise Mobility, Identity, Security.

Get on board with biometrics and your organisation will be better trusted

A majority of consumers would be more likely to trust organisations if they were to use biometrics for authentication, according to a new study from Unisys.

The study, which polled more than 3,500 consumers across seven countries in Europe, found more than two thirds (68%) would trust biometric-friendly organisations more than others. 63% of respondents believe that biometrics are more secure than traditional PIN and password methods, with 57% there adding fingerprint scanning was the most secure form of...

By James Bourne, 06 December 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Security.

How the CIO role is expanding through digital business – and why the time is right for change now

The role of the CIO is changing as organisations’ technical roadmaps and priorities change with it. It’s something we are all more than aware of – and a new report from Gartner focuses on how CIOs in India are adapting to the challenge.

The figures, which come from the analyst firm’s 2018 CIO Agenda Survey, show that for CIOs in India, optimising enterprise operational excellence, tracking business value of IT, and business cost optimisation are their biggest priorities.

In terms of...

By James Bourne, 29 November 2017, 0 comments. Categories: Applications, CIO, Employees, Security.

Cybersecurity for digital transformation: A guide

Digital transformation is all about change, agility, connectivity and meeting today’s users’ expectations. And no matter what industry you’re in, it will play a huge role in the future of your business.

In the eyes of many, though, cybersecurity stands in the way of all this. But it’s still an essential part of your strategy. So, looking forward, you need to ensure you have robust policies in place. As well as a full understanding of cybersecurity’s role in the digital...

By Tim Isaac, 28 November 2017, 1 comment. Categories: App Platforms, Authentication, Enterprise Mobility, Security.

DDoS attack attempts continue to rise – with unsecure IoT devices the culprit

Organisations faced on average 237 DDoS attack attempts during the third quarter of 2017, equating to eight per day.

That is the primary finding from a new study by security provider Corero Network Security, with the figure marking an increase of 35% in monthly attack attempts compared to the previous quarter. The statistics are taken from DDoS attack attempts against Corero customers.

Explaining the reasons behind the increase in frequency of these attacks, Ashley Stephenson, CEO at Corero, said: “The...

By James Bourne, 23 November 2017, 0 comments. Categories: Enterprise Mobility, IoT, Security.

How enterprise mobility will influence healthcare in 2018

Medical facilities are constantly pushing the envelope when it comes to innovation and new technology. So, it should come as little surprise that the healthcare industry is one of the largest global adopters of enterprise mobility—93% of healthcare professionals use a mobile device for work every day.

As the holiday season approaches and a large portion of the healthcare industry enters 2018 planning mode, however, each organisation needs to...

By MOBI, 23 November 2017, 0 comments. Categories: Applications, App Platforms, Employees, Enterprise Mobility, Security.