Archive for the ‘Smartphones’ Category
As more and more employees bring their own smartphones and tablets into the workplace (from iOs to Android devices), the need for keeping data secure on these devices becomes critical.
Credant for Mobile Device Security puts your organization in total control of your data, whether it’s stored or accessed on personally owned or corporately owned mobile devices. Because Credant for Mobile Device Security is centrally managed, IT departments can easily:
- Integrate iOS and Android devices, by tapping into native security features there is no loading and configuring of apps onto the device
- Set policies and restrictions across the enterprise such as requiring a PIN or disabling backups
- Execute commands quickly and efficiently, including reset password or if necessary remote wipe
- Automatically detect unenrolled devices and remove those devices’ access to corporate data if they are lost, stolen or must be deprovisioned
- Compile compliance reports including reports that meet auditor or regulated compliance reporting
“Our customers are facing the new reality that comes with enabling a growing mobile workforce,” said Chris Burchett, CTO and co-founder, Credant Technologies. “With Credant for Mobile Device Security, organizations large and small have the piece-of-mind knowing that corporate data is secure wherever or whenever it is being accessed.”
Your employees continue to be able to work where, when, and on the devices they want, without putting critical data at risk. Learn more about how mobile device security could benefit your organization by visiting our website.
As we look down the road at what the next year holds, let’s take a look at the biggest perceived data threats in 2012. It’s hard not to think about Roland Emmerich’s movie 2012, but hopefully our predictions for potential threats will be a little less apocalyptic than the ones in the movie. Perhaps a little more sensible and realistic.
There are some excellent reports out there on this topic – the Ponemon Institute released “The 2012 State of the Endpoint Report” and “Aftermath of a Data Breach.” Great resources.
In general, confidence in security is not doing very well. Sixty-six percent of people, according to the studies, felt that they are not more secure than they have been in previous years or are at least unsure about their level of security. And, that may or may not be an accurate reflection of the reality. Maybe it’s in part due to the level of coverage that breaches receive and the larger scale, hacktivism type of attacks that occurred over the course of the last year. We are either in a state where people don’t trust information security or we’re in a state of change, a sort of crossroads that remains to be seen. Regardless, there are some big decisions that need to be made.
Thinking about some of the emerging trends from last year, incidents of viruses and malware rose from about 27 percent of organizations to 43 percent of organizations. However, the organizations that made data protection a priority saw that same percentage drop significantly from 61 percent to 29 percent. So what’s going on here really?
I think what’s going on is that we’re seeing organizations actually being more concerned about other issues. In fact, I think the reason is that they think they’re going to have more important things to worry about. Not to say that malware and viruses are not real problems. They certainly are. But the big ticket items I think that are really causing concern this huge growth in mobility. The increase in the number of and the range of mobile platforms is a real challenge.
Inevitably, there’s this wave of concern building around cloud computing and how we manage cloud as it starts to grow in its impact on the enterprises. So these are what I think are diverting attention away from some of the old staples of security discussion: Mobility, resources, data mobility, mobile platforms, consumerization and cloud are absolutely huge challenges.
So what is on the rise? Mobility, hands down. Organizations saying that there was a significant risk posed by mobile devices such as smartphones and tablets increased dramatically. Nine percent of 48 percent of organizations foresee this as a problem. We’re seeing mobile platforms being increasingly targeted. Also there’s the exponential growth in the Bring Your Own Device (BYOD) realm. There’s a consumerization aspect; average employees are walking into the organization saying please connect my phone, tablet, etc. There was a study published end of last year by the Computer Technology Industry Association on the use of mobile devices in healthcare. They said that at the end of last year about 30 percent of doctors were actually already accessing medical records online through applications running out on smartphones and tablets. And that number is likely to grow to something like 50 percent by the end of 2012. The challenge of managing that and of extending controls in place to cover those devices is a very significant one. It’s not really any surprise that we see a big jump in the concern about mobile devices and mobile computing on a broader scale.
Another trend that’s on the rise is the increasing amount of virtualized environments. The 2012 State of the Endpoint Report showed 52 percent of organizations felt that their investments in virtualized environments of some kind are going to increase over the course of the year, or have already increased over the course of the year. It’s sobering to note that almost half the organizations don’t have at least one, single department dedicated to virtualization security. Most organizations simply share the responsibility between departments, which blurs the boundaries of who owns what.
Other increases, which aren’t really surprising, are that 91 percent of organizations saw third party or internal cloud computing risks increase. Most organizations are planning to increase their investment in the use of the cloud. It’s probably also no great surprise that a lot of organizations are still struggling with what that cloud strategy should look like. Forty-one percent say they didn’t really have a cloud strategy yet and frankly, I can’t blame them because it is a complex question. The strategy has to embrace the entire organization and yet the very nature of the way a lot of cloud services are delivered tends to undercut the central control of the typical IT and security organization by essentially delivering services to individual business units and sometimes individual users. It’s a complex problem and it’s getting more complex.
Stay tuned for the next post, where we’ll continue looking at data threats to watch out for in 2012.
If you think the holiday shopping frenzy has died down until the day after Christmas, you may want to stay away from any sort of establishment where you receive things in exchange for cash or the swipe of a card. Because the truth is, you’re sadly mistaken. But, you’re not alone. Most holiday shoppers think that Black Friday is the busiest shopping day of the year, however, the weekend before Christmas Day is actually the busiest, with sales nearly four times as large as those on Black Friday.
Let’s admit it: we’re a society of chronic procrastinators. So naturally, many people wait until the last couple of days in the holiday shopping season to buy gifts. Along with crowded department stores and jam-packed malls, Internet connections are getting a run for their money this time of year, too, whether shoppers are at home, in the office, or on the go.
With the holiday spike of ecommerce and in-store sales also comes the increase of lost wireless devices. As people are scurrying around malls and department stores trying to finish up their last bit of shopping for the year, they often misplace or lose personal belongings like bags, purses, wallets and keys in the process. These belongings often house wireless devices like smartphones, USB storage drives, and even tablet and laptop computers.
In fact, a recent survey we conducted shows just how many devices end up at the lost and found department of several different local shopping malls. If these devices end up, or even the hands of a bored mall employee, any sensitive information stored on the device—whether it’s employee-owned or not—is fair game to the user.
As the end of the holiday season is nearing, but the biggest shopping days are still to come. Make sure you keep track of your wireless devices and protect the data before you decide to brave the mall.
For those sale fiends that didn’t get their fix on Black Friday—or maybe for the ones that have a phobia of large, hostile crowds—there is Cyber Monday. Coined in 2005, this virtual holiday happens the Monday after Black Friday, giving holiday shoppers one last holiday shopping hurrah before December. And boy do they take it. Sales have steadily increased each year during Cyber Monday, going beyond the $1 billion mark in 2010.
One reason that Cyber Monday has picked up steam in just a few short years? Convenience.
In today’s digital world, not only has online shopping increased in environments like corporate offices, school classrooms and the living room sofa, it’s gaining popularity on-the-go, with technology advances in smartphones, tablets and laptops. Ecommerce is happening in taxis, on sidewalks, in restaurants and everywhere else there is wireless reception—especially on Cyber Monday.
Additionally, many devices used for ecommerce are either company-owned, or they’ve been brought into the corporate walls due to IT Consumerization. Nonetheless, when a device is brought into work, it often leaves with sensitive company datastored on it, whether it’s in the form of an app, an email attachment, or stored on the device itself. Many of these devices—especially employee-owned devices—aren’t protected, leaving their contents a free-for-all in the event that the device is misplaced or lost.
For instance, let’s say an employee at your organization places a bid on eBay for a really cool garment they’ve been wanting. It’s in the last hour and they need to place a higher bid, so they pull out their smartphone at lunch, tap the eBay app, place a bid and put the phone back on the table. In a rush to get back to the office, they leave their phone on the table, loaded with several accounts opened, exposing not only their personal information, but sensitive company information in their work email account as well. If this phone were to fall into the wrong hands, not only has the employee put themselves at risk of several accounts of personal data breach, but your organization’s data as well. With the holiday season in full swing, this risk will only increase, especially during Cyber Monday.
As the holiday shopping arrives, it’s not a bad idea to being thinking about ways to protect the data that gets circulated on wireless devices, employee-owned or not.