Subscribe       Feed   All Posts     Search by Topic:
       

Ten Ways to Keep Enterprise Data Safe Inside Mobile Devices

An Osterman Research report recently conducted a survey of 760 individuals addressing the bring-your-own-device, or BYOD, issues facing their organizations and found widespread use of third-party, cloud-based storage and file synchronization offerings that are sometimes used with IT's blessing, but more often not.

Three Lessons Learned from Colossal Government Data Breach

Does the name Bradley Manning mean anything to you? If you’re a government organization, the name is synonymous with “colossal data breach” – as Manning spearheaded the biggest leak of classified information in our nation’s history.

Attach, Send, Secure: On-Demand File Sharing Within Outlook

With 144.8 billion emails sent every day and the number projected to rise to 192.2 billion in 2016, according to the Radicati Group, email remains the preferred method of communication in the workplace – going on two decades strong. Yet, most business users aren’t able to send attachments at will, with IT typically capping outbound file size limits at 10MB.

Information Governance: The Big Elephant in the European Cloud

Are U.S. public cloud providers European data-centers able to keep your data safe?

Losing ZZZ’s Over BYOC

The high-tech world has no shortage of acronyms. DLP, NAC, TCP, WAN, Wifi– the list goes on and on, making it tough to keep track of the latest buzzwords. Perhaps one of the most widely used acronyms currently is BYOD- the much talked about trend of employees bringing their own devices into the enterprise and the security challenges created as a result.

Well, get ready, because there’s a new acronym that’s entered the fold: BYOC. Bring Your Own Collaboration.

Who Controls the Keys to Your (Data) Kingdom?

True or false? When you share your information with a public cloud service, you give up “ownership” rights to that data? Well, as some Twitter users can tell you, when an official legal request is involved, that statement is definitely true.

An iPhone for Everyone: Is that a Sound Mobile Strategy?

As expected, Apple announced the much-anticipated iPhone 5 at this week’s media event to great fanfare and we expect once available it will immediately become part of the BYOD mix.

Get In Control of Sync - Perception of Security is Not Enough

Do you remember the first document you saved on a thumb drive? It used to be that employees wouldn’t leave the office without one – routinely saving board slides and keynote presentations on these mini storage devices. While still a popular giveaway at tradeshows (how many have you stockpiled over the years?), the idea of having corporate data floating around unprotected is too risky of a proposition for an enterprise of any size.

Customer Spotlight: Texas Juvenile Justice Department takes action to protect youth data.

For the Texas Juvenile Justice Department (TJJD), the ability to communicate quickly and securely makes all the difference for the youth they serve. Operating dozens of treatment facilities, correctional institutions and halfway houses throughout the state, TJJD needed a way for its 2,500 employees to share confidential data efficiently and reliably between parents, medical staff and legal counsel.

Missing: My Phone; Sizeable Reward for Ignoring Corporate Data

If it hasn’t happened to you, consider yourself lucky: misplacing your phone is never a great feeling. While you might immediately think of lost contacts, to-do lists, and calendar items, IT administrators have much more serious concerns on their minds, including the possibility of corporate data getting into the wrong hands.

Pages

Subscribe to RSS - blogs