Subscribe       Feed   All Posts     Search by Topic:

Keeping Data Safe in a World of Insecurity


All businesses run on data, whether it's retail transactions, technology solution product specifications, or patient information in a hospital. Its what makes organizations in all industries run, and its one of the most valuable assets of any company.

From BYOD to WYOD: Get Ahead of Wearable Device Security


Wearable technology is the new “it” thing. From FitBit, to Google Glass, to Samsung Galaxy Gear, and now the Apple iWatch, users are literally arming themselves with the latest gadgets. This is particularly true among early adopters who are counting the days until the release of the Apple iWatch.

The Home Depot Breach: What’s at Stake?


Retailers love to earn the number one spot for holiday sales or profit margins, but lately some big names are holding a leading role that is considerably less desirable. Home Depot recently took the number one spot for the biggest data breach in retailing history when an estimated 56 million customer credit cards were compromised. The advancements of cyberhackers means that all retailers are at risk of a digital attack on their POS systems, and the likelihood of another attack being announced in the near future is high. 

The Apple-IBM Alliance: Illuminating the Future of BYOD


The mobile revolution, while firmly embedded in the consumer world, is now beginning to hit its stride in the enterprise world. This can be seen in the recent announcement from Apple and IBM, whose strategic alliance to develop joint solutions leveraging Apple devices and IBM software is an important next step for how enterprises consider mobile technology.

Lessons from the Apple iCloud Data Leak


The theft of celebrity photos from Apple iCloud is a stark reminder of the need to think twice before storing data.  For many people using a Mac the default behavior is to automatically back up and save data to iCloud. It's wonderfully appealing and convenient and seamlessly integrates into practically everything you do on the Mac.  In fact it is so easy most people don't think twice about what they are storing and that is where the problem begins.  

Creating The Best Fantasy Sharing Team of 2014


The sight of trees turning golden red, and the sounds of grown men screaming at the TV can only mean one thing – its football season. But why accept only the players your team’s coaching staff has chosen? Why not go the extra yard, go beyond what Harbaugh was able to do, and create the best team of 2014?

Taking kiteworks Global with our New Partner Program


Disruptive technology advancements will always drive shifts in channel sales behavior, as both vendors and solution providers move towards new requirements and solutions. We’re seeing this in the market now, as mobile solutions continue to evolve and enterprises struggle to deploy the right kinds of technologies to support business benefits and assist in transformation of their old business models to new ones.

Healthcare Organizations Suffering Data Breaches from Stolen Devices


There have been so many news stories of sophisticated data breaches lately that it’s easy to overlook more mundane ways that confidential data can be lost or stolen.

Unfortunately, ordinary data breaches still occur. For example, earlier this year two healthcare organizations cumulatively lost tens of thousands of data records earlier this year because of lost USB flash drives or data sticks. The data breaches were large enough to trigger the HIPAA requirement that they be listed on the data breach Web site of the Department of Health and Human Services.

Balancing the Longer Hours of a BYOD Worker with Greater Security Risks


Three out of four managers surveyed recently by BMC Software say BYOD is a big productivity boost.

There’s a very good reason for this - at the end of the day, employees bring those same devices home, where they use them for additional work late in the evening and early in the morning. That extra work would be difficult or impossible to accomplish if the only computers employees had were desktop systems that stayed in the office.


Subscribe to RSS - blogs