December 11th, 2014
Recently, CIO Online ran an article by Thor Olavsrud entitled, ‘5 Information Security Trends That Will Dominate 2015’. The trends ranged from the growing prevalence of cybercriminals, to the increasing regulation around the collection, storage and use of information, to the continuation of BYOD trends in the workplace and the need for organizations to develop strong policies around this. Read the rest of this entry »
October 21st, 2014
Well, there’s one thing that you can say about the mobile tsunami — it has generated a LOT of acronyms. BYOD, CYOD, COPE, MDM, MAM, MIM, MCM… the list goes on.
One of the newest is “EMM” or Enterprise Mobility Management. The cynic might argue that EMM is just a way for mobile security vendors to sell more of their products by bundling Mobile Device Management, Mobile App Management, and Mobile Content Management into one “must have” über-mobile security solution called EMM. Perhaps they’re right, but mobile security is a significant challenge and making sure that all areas are covered makes it all the more challenging.
Read the rest of this entry »
October 9th, 2014
Without question, one of the most important trends in IT during the past few years has been the shift to mobile computing – the use of smartphones and tablets to access business email, to read and edit corporate documents, to access corporate applications, and to communicate and collaborate with others in real time. In fact, Osterman Research has found that 33% of the typical information worker’s time is spent doing work on a mobile device, and 42% of work-related content is accessed via mobile devices, while 31% of content is created on mobile devices. Read the rest of this entry »
October 7th, 2014
You know that a great many of your employees are working from their mobile devices – viewing and responding to email, reading attachments and forwarding them on. As Forrester analyst Chris Sherman noted in a report earlier this year, “On average, 15% of employees are accessing sensitive data such as customer information, non-public financial data, intellectual property, and corporate strategy from devices other than work laptops and desktops. Employees are continuing to use their personal devices to view confidential business information.” Read the rest of this entry »
July 14th, 2014
Can you defend your decision to delete data your organization no longer requires? That’s a critical question that every organization must address at some point.
MOST CONTENT SHOULD BE DELETED
A 2012 survey conducted by the Compliance, Governance and Oversight Counsel found that data can be placed into one of four “buckets”:
• At any given time, 1% of data must be retained for litigation holds
• 5% of data must be retained because of regulatory obligations
• 25% of data has some level of business value
• The remaining 69% of data has little or no business value
Consequently, more than two-thirds of data can be safely deleted with little or no consequence. Read the rest of this entry »
July 4th, 2014
It’s happened to you. I know it’s happened to me. I small error in typing an email address, attaching the wrong document to an email, not doing a second check…and click – you’ve just sent something to the wrong person. Oops. For me, it’s never been catastrophic – I might have inadvertently invited one of my friends to a 3pm meeting, causing a bit of confusion – but I’m one of the lucky ones. Read the rest of this entry »