• NEWS
  • INDUSTRY SPOTLIGHT
  • SECURITY BLOGGERS NETWORK
    • ANALYTICS
    • APPSEC
    • CISO
    • CLOUD
    • DEVOPS
    • GRC
    • IDENTITY
    • IDENTITY RESPONSE
    • IOT / ICS
    • THREAT / BREACHES
    • MORE
      • BLOCKCHAIN / DIGITAL CURRENCIES
      • CAREERS
      • CYBERLAW
      • HUMOR
      • MOBILE SECURITY
      • SOCIAL ENGINEERING
  • CHATS
  • LIBRARY
  • WEBINARS
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • Homepage
  • Security Bloggers Network

NCSAM: Six Tips to Help Keep your Business Secure

During the last half of the 1990s, there was a concern for employees using their own home desktop computers to dial in to the corporate network from home. Thousands of articles and hundreds of conference sessions discussed the associated risks and then how to mitigate them through documented policies and the use of new tools.

Soon after the year 2000, these concerns expanded to employees using their personally owned laptops outside of the office and in other facilities instead of the corporate-issued computers. Thousands more articles and hundreds more conference sessions discussed how to address the risks.

Just a few short years later, smart phones started being widely used…thousands of more articles and hundreds of more sessions. And soon, employees were using not just one but multiple smartphones, tablets, laptops and wearables for not only personal activities but also for work activities.

The types of new technologies that employees are using within work environments and for business activities are going to continue to grow exponentially. Their personal data is getting more mixed in with the business data on those devices. How can organizations get ready for these increasingly high-tech employees? How can they keep the business data separate from the personal data? Can they even do this anymore?

There are increasingly complex ways in which employees are connected to…

  1. the Internet;
  2. directly to other individuals
  3. Wi-Fi enabled objects that are passively collecting your mobile device exhaust, and/or images of you, as you pass by them;
  4. unlimited numbers of unknown others slurping data through their mobile apps; and
  5. growing numbers of other “smart” internet of things (IoT) devices that are automatically taking the data generated and passing it along to unlimited others.

This is complicated by the fact that these workers are increasingly doing work remotely, away from the (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/security-awareness/ncsam-six-tips-keep-business-secure/

Tags: data protectionFeatured ArticlesncsamRebecca HeroldsecuritySecurity Awareness
2 years ago
Tripwire Guest Authors

Related Post

  • Pandemic Waves Underscore Vulnerabilities in Cloud File Systems

    As the second wave of COVID-19 hits and remote work increases again, the need for…

  • Why Hackers Love the Pandemic

    The novel coronavirus pandemic has been a boon for cybercriminals seeking profit amid chaos. Tanium's…

  • Secure Enclaves: Data Protection So Secure, No One Knows About It

    Secure enclaves may be the technology that no one has heard of—yet The primary objective…

Recent Posts

  • Cybersecurity
  • Data Security
  • Featured
  • Incident Response
  • Network Security
  • News
  • Security Boulevard (Original)
  • Spotlight
  • Threats & Breaches

EU Vaccine Regulator Hacked for Pfizer/BioNTech Info

The European Medicines Agency (EMA) says it was hacked by persons unknown.

15 mins ago
  • Press Releases

NewDay Scores with TigerGraph Cloud to Fight Financial Fraud

Leading UK Credit Card Consumer Finance Company Uses Advanced Graph Analytics to Intercept Fraudulent Credit Card Applications, Boost Anti-Fraud Efforts…

1 hour ago
  • Press Releases
  • Press Releases

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…

3 hours ago
  • Security Bloggers Network

The Hacker Mind Podcast: Hacking OpenWRT

For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…

3 hours ago
  • Data Security
  • Security Bloggers Network

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…

4 hours ago
  • Network Security
  • Security Bloggers Network

Being a Defender

1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends,…

4 hours ago
  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • t