In a previous post1 I raised three pitfalls that your BYOD program cannot afford to ignore when allowing employees to use their personal devices for work: Remote deletion of personal data on an employee-owned device Tracking an individual’s location Monitoring an employee’s Internet access Based on my involvement with various BYOD projects and my ongoing…
Read MoreBy Rik Ferguson ( Photo by: Leif Martin Kirknes, Computerworld Norway) Mac users have for many years laboured under the misapprehension that their machines are inherently more secure than PCs. For a long time, while Microsoft-powered PCs enjoyed stellar success, there was no real way to dispute this theory as time and again Windows…
Read MoreTrend Micro is putting on a pretty cool, free event for virtualization and security industry leaders. We’re doing interactive roundtables and presentations to help IT people learn how to protect your data when using new innovative computing environments represented today by virtualization and cloud architectures. Our presenters will share how progressive business and IT leaders…
Read MoreI was on a panel at the DCIA Cloud Computing Conference at the NAB show in Las Vegas. You can hear the entire panel here. The topic was Privacy Issues, Reliability Questions, Security Concerns in the Cloud Computing Space, and the panel included: Dave Asprey, VP, Cloud Security, Trend Micro Tom Mulally, Consultant, Numagic Consulting…
Read More“We’ll have to send it out to a service facility,” said the Apple Store rep. “What kind of turnaround time are we talking about”? I asked. “Probably no more than 5 days.” Immediately I began calculating. Let’s see, today is Wednesday, so three more work days. What do I have coming up? I need to…
Read More
Keeping information safe has been one of today’s most challenging tasks for IT personnel, as new technologies and solutions evolve and become more widely utilized in the enterprise.
Read More
In the internet age, data has become king. With most consumers now using mobile devices and social media to complete personal and work tasks, enterprises are leveraging these platforms to collect, store and share an abundance of information about prospective and existing customers.
Read More
The findings indicated that just seven of the 24 agencies surveyed have achieved greater than 90 percent compliance with FISMA protocol, with the average across all agencies standing at 72.8 percent.
Read More
According to PwC research, cybercrime is now the second most commonly reported economic crime affecting financial services firms.
Read More
A data breach can have serious repercussions on a company, including fines, damaged reputation and even lawsuits.
Read More