Is there room left for privacy in the digital world?

Just as Native Americans sold the island of Manhattan to colonial governor Peter Minuit for $24 worth glass beads - at least, that’s what the legend says - people are now selling out their private data for “glass beads” to Facebook and Google. For data drilling companies, profit comes first, privacy last. They sacrifice everything for growth and engagement for their platforms in order to collect as much data as possible to profiteer from advertising.

Is there anything we can do about...

By Istvan Lam, 09 October 2018, 0 comments. Categories: Employees, Privacy, Security.

Enterprises are finding open source so alluring that vulnerabilities are less important

The Equifax data breach of 2017 was a bad one. Just how bad it ended up being was only revealed in May this year. This isn’t for the faint of heart: 209,000 payment cards, 99 million addresses, and more than 146 million people affected.

Yet these revelations have had little effect on organisations using vulnerable open source software. According to the latest State of the Software Supply Chain report from Sonatype, the...

By James Bourne, 27 September 2018, 0 comments. Categories: Applications, Data & Analytics, Data Loss, Privacy.

Gartner identifies seven steps to bring down risk of security threats from Spectre and Meltdown

It is beneficial for leaders in the security and risk management field to adopt a pragmatic and risk-based approach to deal with the ongoing security threats posed by the "Spectre" and "Meltdown” vulnerabilities, according to Gartner.

Gartner identifies seven steps that security and risk heads can follow to bring down the risks associated with security threats.

Almost all modern IT systems are at risk of security threats so all desktops, mobiles, servers, virtual machines, IoT devices and...

By Enterprise CIO, 16 February 2018, 0 comments. Categories: CIO, Privacy, Security.

One in four companies only use passwords as BYOD defence, research finds

Here’s a worrying security statistic in research released today by Bitglass: one quarter of organisations use passwords only for BYOD security.

The research, which took its cue from more than 200 IT and security professionals surveyed at a recent Gartner conference, found that external sharing was the leading cloud security concern for those polled, cited by 45%. Other security scares include malware protection (40%) and unmanaged device access (40%).

For those who do use multi-factor authentication to...

By James Bourne, 02 November 2017, 0 comments. Categories: Authentication, BYOD, Identity, Privacy, Security.

Why organisations need to get ready for security automation

Data protection has always been a top priority for businesses. If the wrong person gets ahold of your clients, your business practices, or your internal structures, they can easily topple the business that you've built. However, as we've moved further into using technology and the internet for business, attackers have also moved on, and cyber threats are becoming more common and more dangerous. Security automation is the up-and-coming answer to this. Here's some information on how you can use

By Rick Delgado, 25 October 2017, 0 comments. Categories: App Platforms, Privacy, Security.

Malware attacks on iOS more than triple while Android remains largely flat

Mobile security company, Skycure has conducted a research and noted its findings across leading mobile operating systems: Android and iOS on the basis of the scans performed on the mobile devices of its enterprise customers and from the scans of mobiles of consumers who download its free app. It has learned that malware attacks on apps have risen for Apple’s iOS as compared to Android.

According to Skycure's Mobile Threat Intelligence report, Skycure found that about 0.65% of these had...

By Enterprise CIO, 19 July 2017, 0 comments. Categories: Android, iOS, Privacy, Security.

Insider threats remain a worry – but enterprises getting better at detecting it

(c)iStock.com/Jirsak

The latest research note from data protection provider Bitglass has found that three quarters of organisations feel vulnerable to insider threats, while one in three had experienced an insider attack during the past year.

The report, around insider threats in the enterprises which polled more than 500 cybersecurity professionals, argued that the main concern among organisations is leaks due to unsanctioned app usage, cited by 71% of respondents. Negligence (68%) and malicious insiders...

By James Bourne, 30 September 2016, 0 comments. Categories: Collaboration, Enterprise Mobility, Privacy, Security.

Should vendors be forced to give encrypted data to the government?

(c)iStock.com/maxkabakov

More than one in three IT pros believe cloud providers should be forced to give government access to encrypted data, according to the latest research study from the Cloud Security Alliance and data protection providers Bitglass.

The research, which appears in a report entitled Mitigating Cloud Risks, surveyed 176 information security professionals and found US-based respondents were more likely to be opposed to government information (64%) than their EMEA counterparts (42%). 10% of...

By James Bourne, 11 August 2016, 0 comments. Categories: Cloud , Data & Analytics, Privacy, Security.

Skype for Business gets solid user feedback – but mobile issues need to be ironed out

(c)iStock.com/svariophoto

It has been almost a year and a half since Microsoft announced it was reskinning and revamping Lync as Skype for Business – so are users satisfied with their experience? In a word: yes. In two words: yes…but.

A new study released today from Osterman Research and Unify Square, a unified comms vendor with a specific Redmond focus, finds more than half (52%) of...

By James Bourne, 12 July 2016, 0 comments. Categories: Collaboration, Enterprise Mobility, Microsoft, Privacy, Productivity.

Research warns of yet more lax employee mobile security practices

(c)iStock.com/allvisionn

One in five employees share their work email passwords, while 12% share passwords to other work applications, according to new research data released by identity and access management provider OneLogin.

The study, conducted by Arlington Research of more than 1,000 US-based respondents in May this year, also found one in five workers do not bother with additional security software on their devices, beyond what ships with the operating system, while employees admit to letting their...

By James Bourne, 04 July 2016, 0 comments. Categories: Employee Education, Employees, Enterprise Mobility, Privacy, Research, Security.

Bitglass warms of ‘MDM mayhem’ in latest research

(c)iStock.com/erhui1979

Cloud access security provider Bitglass has warned of ‘MDM mayhem’ in the results of its latest study which argues mobile device management (MDM) software contains major privacy issues for users.

The report got volunteers to test unnamed MDM products for a week, and through routing mobile traffic through a corporate proxy, normally used in MDM to inspect traffic for malware, found a number of alarming findings, from being able to see employees’ personal email inboxes...

By James Bourne, 24 June 2016, 0 comments. Categories: Enterprise Mobility, MDM, Privacy, Security.

The key to unlocking Identity 3.0 – and avoiding the hell of “crap” passwords

(c)iStock.com/AnthiaCumming

Identity is almost irretrievably broken – and those who are trying to fix it are going entirely the wrong way about it.

That was the underlying theme from an entertaining talk by Paul Simmonds, CEO of the not-for-profit Global Identity Foundation at Cloud and DevOps World, which puts a focus on finding a global identity solution which is privacy enhancing and globally scalable.

Pulling no punches in the early stages – describing passwords as “really crap”...

By James Bourne, 22 June 2016, 0 comments. Categories: Data & Analytics, Data Loss, Identity, Privacy.

Businesses receive another warning over the threat of DDoS attacks

(c)iStock.com/Sergey Nivens

We have all heard the stories of businesses which have suffered debilitating DDoS attacks and, in some cases, succumbing altogether. Take Code Spaces, the web-based SVN and Git hosting provider which suffered such an attack in June 2014 that it was forced to wave the white flag and cease trading after recovering all the data lost would cost too...

By James Bourne, 16 June 2016, 0 comments. Categories: Privacy, Security.

Microsoft toughening up password requirements – but is it too late?

(c)iStock.com/frenky362

It is an issue that has rumbled on for as long as most of us can remember – but now Microsoft aims to make the dreaded password a little bit safer by banning easy passwords.

The news comes amidst a series of data breaches; the LinkedIn data breach which hit the news last week – albeit not containing any new data from beyond the previous breach in 2012 – being chief among them. Since then however, it has emerged that hackers have stolen up to 65 million Tumblr...

By James Bourne, 31 May 2016, 1 comment. Categories: Authentication, Employees, Enterprise Mobility, Privacy, Security.

Enterprise compliance and productivity: Should emails have a keep by date?

(c)iStock.com/peshkov

A recent report by Radicati revealed that the number of business emails sent and received per user per day in 2015 was 122 and predicted that this will rise to 126 by 2019. That is a lot of emails and a lot of data. Add to that the growing trend for workers to store information in email inboxes, rather than saving down on file, and it has led lots of businesses and developers to...

By Robin Bingeman, 18 May 2016, 0 comments. Categories: Data & Analytics, Employees, Privacy, Security.

VMware launches AirWatch 8.3, bangs drum for UX and privacy

(c)iStock.com/Jaap2

VMware has announced the launch of AirWatch 8.3, an updated version of the Atlanta-based enterprise mobility provider’s platform which includes integration with the recently released Workspace ONE among other new features.

The move again links into VMware’s vision of ‘consumer simple, enterprise secure’, with the company pushing the part of greater user experience as well as greater transparency in privacy. In the case of the latter, the website

By James Bourne, 17 February 2016, 0 comments. Categories: Enterprise Mobility, Privacy, UX.

How new security solutions will be a major enabler of the mobile enterprise

(c)iStock.com/piranka

Within the past few months, we have seen numerous initiatives by enterprise mobility providers to support the growing number of mobile-empowered enterprises.

On January 5 AirWatch by VMware announced its collaboration with Intel Security. The reason for these two giants to team up was to address the most...

By Sarah Green, 09 February 2016, 0 comments. Categories: Enterprise Mobility, Privacy, Security.

Verizon warns of bigger, more frequent enterprise data breaches in 2016

(c)iStock.com/weerapatkiatdumrong

Telco giant Verizon has sent out a gloomy warning: regardless of the doubling down on enterprise security, 2016 will see even more, even higher profile data breaches.

The company has released nine predictions for enterprise IT, and alongside the security snafu, Verizon also predicts a shift from the more traditional enterprise security methods to fit more with user need, leading to a more ‘common sense’ approach which will enable chief security officers to focus...

By James Bourne, 19 January 2016, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Privacy, Security.

Why mobility is moving faster than the CSO

(c)iStock.com/erhui1979

The future

Alice begins her workday staring at a white wall in order to get the best resolution with her smarteye. The smarteye contact lens projects light into her retinas having the best contrast with a colourless background. Reading midway through the morning news blogs, she receives a gentle tap from her outdated smartwatch. The tap indicates her IoT coffee maker received the trending brew formula from a cyber roaster and has completed its automated task.

She brings a 3D printed...

By MobileIron, 15 January 2016, 0 comments. Categories: Applications, Authentication, Enterprise Mobility, Privacy, Security.

Mobile security: Why you’re not getting fooled again

(c)iStock.com/piranka

By James Plouffe, Solution Architect, MobileIron

It’s hardly uncommon for security policies and tools to be perceived as draconian or invasive. The consensus is that— more often than not— they hinder rather than help the day-to-day efforts of most employees.

Looking at the way these tools have traditionally operated, it’s easy to be cynical: everyone can picture the seemingly endless prompts to update anti-virus signatures, the performance impact of scheduled...

By MobileIron, 16 October 2015, 1 comment. Categories: Enterprise Mobility, Privacy, Security.