In this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then defensive strategies are presented.
Search results for: "BYOD"
A Gartner survey has found that one in four employees who bring their own smartphones and tablets to work suffered a security issue in the past year - and spent an hour per day on their BYOD devices.
Four out of ten employees who use their own mobile devices at work fail to use basic security measures - and the trend for "BYOD" could be putting company information at risk, according to a new survey.
Employees bringing their own devices to work is a security headache for most companies - even, it seems, the U.S. military. A report issued by the U.S. Department of Defense’s Inspector General last week pinpointed serious security failings around 14,000 commercial devices used by soldiers and civilians.
Presented at the Virus Bulletin 2012 conference in September, this paper considers the pros and cons of the BYOD trend, potential attack vectors, and advice on countermeasures. First published in Virus Bulletin 2012 Conference Proceedings*
The hottest IT trend in the workplace right now is definitely BYOD: Bring Your Own Device. This is popular with employees who regard it as a convenient way to read private e-mail and to browse to (work-unrelated) sites at the office, and moreover as a way to work for their employer on a device they
According to the PwC Top Health industry issues of 2013 report, healthcare managers and consumers are increasingly concerned about the rise of healthcare workers using their own devices within hospitals and other healthcare centers.
The phenomenon of organizations allowing or encouraging their employees to use their own computing devices for work–known as Bring Your Own Device, or BYOD–is now widespread in many countries, bringing with it some serious risks to company networks and data. As we first reported here on the blog a few weeks ago, ESET commissioned a
Employee use of personally-owned computing devices for work-related purposes–known as Bring Your Own Device or BYOD–is not a new trend and security professionals have been concerned about it for some time, but there is a widely held view that the trend has been transformed of late. Why? Waves of mobile digital devices flooding into the
If we can’t secure the supply chain, eventually everything else will break
No one has a road map for securing a connected city – but there should be a whole atlas of such maps
ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk
Only one in seven organizations have put in place all four basic cybersecurity practices specified by Verizon – changing all default passwords, encrypting data transmitted over public networks, granting employee access on a need-to-know basis, and testing security systems regularly.
Granted, not all that glitters is gold, and mobiles also come with some drawbacks in terms of the protection of information. There are a number of risks that users may face when trying to secure their information on mobiles and tablets.
The number of IoT devices is set to surpass 20 billion by 2020. We take a look at how connected things threaten our security as cybercriminals exploit weaknesses in the smartphones that control them.
There is a real feeling that smartphones are becoming a bigger target for cybercriminals. So why are they so eager to get into our devices?
If you thought that the problem of tech support scams was disappearing, think again, says Josep Albors and David Harley.
Infosec is a technical discipline, but it also requires good, skilled cybersecurity professionals. We take a look at the bigger picture.
Knowing where your weak spots are as organization is important, as is ensuring that you actively do everything you can to stay secure from data leaks.