During the last half of the 1990s, there was a concern for employees using their own home desktop computers to dial in to the corporate network from home. Thousands of articles and hundreds of conference sessions discussed the associated risks and then how to mitigate them through documented policies and the use of new tools.
Soon after the year 2000, these concerns expanded to employees using their personally owned laptops outside of the office and in other facilities instead of the corporate-issued computers. Thousands more articles and hundreds more conference sessions discussed how to address the risks.
Just a few short years later, smart phones started being widely used…thousands of more articles and hundreds of more sessions. And soon, employees were using not just one but multiple smartphones, tablets, laptops and wearables for not only personal activities but also for work activities.
The types of new technologies that employees are using within work environments and for business activities are going to continue to grow exponentially. Their personal data is getting more mixed in with the business data on those devices. How can organizations get ready for these increasingly high-tech employees? How can they keep the business data separate from the personal data? Can they even do this anymore?
There are increasingly complex ways in which employees are connected to…
This is complicated by the fact that these workers are increasingly doing work remotely, away from the (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/security-awareness/ncsam-six-tips-keep-business-secure/
The European Medicines Agency (EMA) says it was hacked by persons unknown.
Leading UK Credit Card Consumer Finance Company Uses Advanced Graph Analytics to Intercept Fraudulent Credit Card Applications, Boost Anti-Fraud Efforts…
Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…
For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…
It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…
1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends,…