Is BYOD a Nightmare for IT Security or a Dream Come True?
While you still may be debating whether or not to allow employees to use their own smartphones or tables for work, many organizations realize that they may not have a choice.
Read more:
Get Started for FREE
Sign up with Facebook Sign up with X
I don't have a Facebook or a X account
Your new post is loading...
Your new post is loading...
Current selected tag: 'Government'. Clear
Scoop.it!
Is BYOD a Nightmare for IT Security or a Dream Come True?
Read more:
No comment yet.
Sign up to comment
Scoop.it!
Why Mobile Device Management Needs Mobile Security... A MUST for "Bring Your Own Device" (BYOD)!
Read more: http://www.websense.com/content/brighttalk-mobile-security-webcast.aspx?cmpid=prtw
Scoop.it!
From
www2
With time on their hands, students turn to the Internet more during summer and that has law enforcement issuing a warning to parents: If you haven't talked to your kids about online safety already, the time is now.
===> "What we're saying is educate the kids about the dangers on the Internet." <===
Gust MEES: check out also my free courses about IT-Security where you learn by easy to follow steps how to secure your computer:
- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/
- http://gustmees.wordpress.com/2012/05/27/visual-it-securityteachers-worksheet-part1/
- http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/
My free courses show you HowTo stay more secure and the proposed programs don't need a lot of time to work with it...
Read more:
Scoop.it!
Using a data set consisting of 120,000 data points, researchers from OPSWAT estimate that Avast is the market share leader in the antivirus software market.
Gust MEES:
1.) IT-Security, Internet-Safety, Online-Safety, Cyber-Security are a need and a MUST for 21st Century Teaching and Learning! That's why this article is mentioned in this Topic!!!
2.) other companies not mentioned should perhaps make more efforts on "Social Media" and get more "social" as well to be present on main PC Magazines + Mac Magazines for a better marketing of their products! Critical Thinking, sorry ;) Learn that the customer doesn't need to go to you, but that YOU should go to the customer ;)
Read more: http://www.zdnet.com/blog/security/which-is-the-most-popular-antivirus-software/12608
Scoop.it!
Cyberwar, cybercrime, cyberattack. We’re hearing about it all the time. The fact is, it’s not going away. Not by a long shot.
Cyberwar, cybercrime, cyberattack. We’re hearing about it all the time. From new bills before Congress to new technologies designed to protect us, just how safe are we?
We’re under assault from nation states, organized crime gangs, terrorists, hacktivists, for-profit corporations, and even the pimply-faced teenager down the street. When will it all just go away?
===> The fact is, it’s not going away. Not by a long shot. <===
Phishing, spamming, distributed denial of service attacks, worms, malware, intrusion, exfiltration — all of these describe various forms of assault on our computers, servers, phones, and bank accounts.
===> Even our smartphones are being compromised at a disturbing rate. <===
Read more :
Scoop.it!
Students ought to be taught cybersecurity knowhow as soon as tech is introduced to them, and such courses should be holistic to include ethical and societal impacts, observers say.
Read more: http://www.zdnetasia.com/cybersecurity-education-should-start-early-62305154.htm
Scoop.it!
Fortinet conducted a global survey that reveals the extent of the challenge posed to corporate IT systems by first generation Bring Your Own Device (BYOD) users; people entering the workplace with an expectation to use their own devices.
Read more: http://www.net-security.org/secworld.php?id=13126&utm_source=dlvr.it&utm_medium=twitter
Scoop.it!
While schools are right in teaching students about the dangers that exist online, a new website aims to promote the benefits of internet use—as well as bridge the generational gap in online use and knowledge between youth and their teachers and...
Gust MEES: A very good approach which I agree too, but the need of learning IT-Security is still there and a MUST!
Critical-Thinking: Existing problems don't go away with a makeup ;) Internet will not look more sexy after that, sorry...
Protect your computer and you protect ALSO the community on Internet, check my free courses to learn more:
- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/
- http://gustmees.wordpress.com/2012/05/26/visual-it-securitylearn-with-videos/
- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/
Scoop.it!
Faced with external security threats from hackers and others, along with a growing array of even more dangerous internal security threats, companies worldwide are feeling the heat.
Organizations traditionally have had only two options to address identity and access management:
1. Internal excessive privilege - System Administrators with complete access to servers and data can pose a tremendous internal threat if they turn against the company. Similarly, everyone from admins up to executives poses a threat to security and data if they maintain excessive access rights after changing positions or taking on different roles.
2. Third party access - Giving partners and other third parties appropriate access to data is no longer cut and dried. Data stored in the cloud may be located across the country or overseas—or sit on physical servers owned by one vendor, but housed in facilities owned by any number of data centers. Employees of these third parties often have direct access to unencrypted data, or they may retain copies of both encrypted or unencrypted data.
3. Hacktivism - Politically motivated hacking is on the rise. Members of various groups assert that much of their success comes not from their technical expertise, but from having found easy targets. While an organization may not have control over whether or not it is attacked, effective identity and access management strategies and technologies, and basic employee security training, will reduce the chances that attacks will succeed.
4. Social engineering - Social engineering is the age-old technique of using lies, deception and manipulation to gain sufficient knowledge to dupe an unwary employee or company. Using public social channels to detail every aspect of your upcoming “unplugged” vacation trip may be just what a scammer needs to put an attack in motion.
5. Internal negligence - Negligence typically is an offense committed by management when “they should have known better.” Most successful data security breaches have some element of managerial negligence associated with them, such as simply forgetting to check log reports for clearly suspicious patterns.
Gust MEES: A MUST READ for Education and Business!
Read more:
Scoop.it!
VERACODE: Mobile Security for the Rest of Us!
Get Our Fun New E-book Join Joe IT and his blissfully unaware mobile device user Joe Worker as they navigate together the perils of BYOD. It’s a whimsical look at a serious subject and readers walk away with Ten Tips to secure their device.
Gust MEES: A MUST READ!
Read more about VERACODE here:
Scoop.it!
84.6% of 21st century vacationers use their mobile devices to check their email, according to Prosper Mobile Insights. The thought of being without a smartphone, tablet or a computer, even while off in a foreign country, is a foreign thought for most of us. And if you’re always connected, you’re always at risk of some online nastiness.
Gust MEES: check out also my free course here http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/
Read more:
Scoop.it!
Possible instructions for educators on how they can work together with the learners. Knowing the tools for 21st Century Learning is primordial to give quality courses.
One very important knowledge who needs to get taught is “Critical Thinking”; it brings out also new ideas and the courage to become an engager and helps to try to build a better world in both worlds: “Real World” and “Virtual World” (Internet)!
Can YOU drive a car (and this also safely) ONLY by getting theoretical courses and advice? YOU would surprise me, seriously, a BIG LOL for that. So how YOU will expect that someone could surf secure with his computer as it is “visually seen” the “vehicle” with whom users are driving on the “Data High Way” (Internet)!???
There is a need for practice, how!?
Find out more ideas, critical thinking and practice:
Gust MEES's comment,
May 28, 2012 6:07 PM
Hi,
Thanks very much to spread this #criticalthinking and hopefully we will see in next future practical courses about #itsecurity ;) Have a nice week: Gust
Scoop.it!
Last week we told you how to protect yourself from mobile malware http://safeandsavvy.f-secure.com/2012/05/08/5-ways-to-keep-your-mobile-phone-safe/
For people who want to go a step further and understand the threats your smartphone faces, we’re going to take a quick look inside the F-Secure Mobile Threat Report Q1 2012. What you’ll find is a Android landscape where threats are quickly maturing.
Read more: http://safeandsavvy.f-secure.com/2012/05/18/what-you-need-to-know-about-mobile-malware/
|
Scoop.it!
From
www
Managing a company’s IT infrastructure is fast becoming an overwhelming task. Users want anytime, anywhere access. Mobile device management and shrinking budgets add to the burden.
Read more to learn about the new trend "BYOD":
http://www.csc.com/cybersecurity/insights/85869-aspiring_to_situational_awareness_in_security?ref=hp
Scoop.it!
From
www
What Teachers + Educators should learn about BYOD
Gust MEES: Most of articles, blogs and Tweets witten by educational people are showing the advantages of "Bring Your Own Device" (BYOD) and they embrace very well BYOD, which I do also; but...
There are some more things to consider such as:
- A BYOD Policy in the campus, school...
- Prepare for BYOD in your organization
Read my complete curation about it here: http://www.scoop.it/t/21st-century-learning-and-teaching?q=BYOD
===> Read and learn also about IT-Security, YES that is a MUST in 21st Century in Education, especially when using BYOD: <===
- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/
Learn also about eCitizen, Digital Citizenship where Teachers should stay there as good example and knowing about their responsability:
- http://www.scoop.it/t/21st-century-learning-and-teaching?tag=eCitizen
Responsability as eCitizen for the Government, be a good patriot and know how to defend your Government against Cyber-Attacks and Cyberwar, why and how?
===> The above mentioned must be included in Education and especially when using BYOD, read these blogs and curated articles and you will understand that they are a MUST ;) <===
Check out also my new blog "Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure":
http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
Scoop.it!
Institutions of higher learning need to think like businesses AND consider the enormous financial and reputational dangers of a data breach. Unlike many businesses, colleges and universities are under constant attack, from within as well as without.
Read more: http://www.securityweek.com/higher-education-perfect-security-storm
Scoop.it!
Cybersecurity Summary for Parents
Learn how to help your kids use the Internet safely and responsibly...
Read more:
Scoop.it!
Google has shared some interesting Web security statistics, and while the information was not published as an official “threat report”, the company has provided some insight into the growth of malicious activity across the Web.
he company provides a free and public Safe Browsing API that allows other organizations to keep their users safe by using the data Google has compiled.
• Google said it discovers about 9,500 new malicious websites every day – These sites could be either innocent sites that have been compromised by cybercriminals, or purpose-built sites designed for malware distribution or phishing.
• Approximately 12-14 million Google Search queries per day show warnings in order to caution users from going to sites that may be compromised.
• Google provides malware warnings for about 300,000 downloads per day through its Chrome download protection service.
• Google also sends thousands of notifications daily to Internet Service Providers (ISPs) & CERTs to help them keep their networks clean.
Read more: http://www.securityweek.com/google-produces-informal-web-threat-report-shares-insights
Scoop.it!
What should organisations be doing to benefit from the move to intelligence-led security?
I do not want to go into great detail about the method here, as the paper makes worthwhile reading for security and business executives, but I do want to highlight one aspect of intelligence-led security that stands out for me:
===> the need for information sharing. <===
An incident that one organisation may see should be shared with others in a structured and confidential way. Cybercriminals share information about us, so there is a case for us to share information about them and their techniques, motives and actions.
In summary, intelligence-led security is the only sustainable approach to security, and ===> we all need to work together <=== to move away from the compliance-based and/or firefighting approaches we have had for so long.
Read more:
Scoop.it!
All over the world, Internet scams abound. Check out this infographic for tips on how to ensure that you don't fall prey to a scheme.
Read more: http://mashable.com/2012/06/17/internet-scams-infographic/
Scoop.it!
Where Europe succeeds, we succeed
The Web has prompted tremendous growth and innovation over the last two decades, but also a new set of challenges.
Cybersecurity has emerged as a significant global threat. Every day more than a million people are successfully targeted by cyber criminals.
===> That’s a new victim every 14 seconds. <===
Malicious attacks are mushrooming and conservative estimates put the annual cost of cybercrime at $114 billion. Given this, it’s hardly surprising that the World Economic Forum’s Risk Response Network recently elevated cybersecurity to a top five global risk, alongside issues such as income inequality, rising greenhouse gas emissions and fiscal imbalances.
Gust MEES: in the word ICT = "I", meaning "Information", so this is necessary in Education especially! IT-Security in 21st Century is a need to get included in curriculum, it's the responsibility of Education to teach IT-Security and Internet-Safety... By knowing that every 14 seconds there is a new victim to cybercriminals I hope that educators and teachers will see the importance of preparing best their learners to be best protected, even if they need to learn themselves about it, we are ALL "Life Long Learners" ;)
Read more: http://www.microsoft.eu/digital-policy/posts/tackling-cybersecurity-together.aspx
Scoop.it!
Cyberattacks -- including hacks and data theft -- aren't just for big companies. Here are steps you can take to protect your small business.
Gust MEES: A MUST READ also for Education!
Read more: http://mashable.com/2012/06/10/small-business-cybersecurity/
Scoop.it!
Mobility is empowering individuals and boosting productivity. But these advantages are offset by another vision of mobility as an unchained malady - multiplying the threat environment and thus making securing the enterprise even harder to manage.
As companies continue to embrace mobility and BYOD, what are the myriad security implications that result and how can CSOs properly address these? With a number of up-to-the-minute feature stories, plus a Q&A with leading CSOs, and a case study detailing an enterprise mobile implementation, we explore these issues and more in this special Spotlight edition of SC Magazine.
Gust MEES: you need to complete a form first to download the requested PDF document, but it is worth to read for best #BYOD and also #itsecurity...
Read more:
Scoop.it!
Security threats: time-consuming, expensive, and an all-around headache for your IT organization. Here are the five big ones to look out for.
Read more: http://www.zdnet.com/blog/btl/the-top-5-security-threats-to-your-company/79663
Scoop.it!
Netsafe Netbasics:
Nicely-done videos about internet safety
Check out here:
|