You are here

Share
Posted by Paula Skokowski
Most Americans don’t think their personal data is safe. That’s the unmistakable conclusion of a recent Pew Research Center study of Americans’ attitudes about privacy, security, and surveillance. The study, based on surveys in 2014 and early 2015, found that: 93% of American...
Posted by Hormazd Romer
Chances are, your organization is using Dropbox for sharing and syncing files, regardless of whether or not your IT organization has approved Dropbox for official use. Dropbox is one of the most popular services in “shadow IT”—the products and services that employees adopt without...
Posted by Hormazd Romer
How many unsafe mobile apps—apps that could potentially spread malware or contribute to a sustained security attack—can be found on the typical enterprise network? 10? 20? 100? A new survey by Veracode reports that the number is even higher: 2,000. The typical enterprise network is...
Posted by Yorgen Edholm
Mobile users prefer by a wide margin native apps written to run specifically on mobile operating systems such as Android or iOS, to browser-based apps, according to a recent survey by mobile analytics firm, Flurry. On average, mobile users are spending almost three hours a day on their devices, and...
Posted by Vidhya Ranganathan
Enterprise organizations interested in developing their own mobile apps would benefit from reading HP Security Research’s new Cyber Risk Report 2015 . The report presents an in-depth look at enterprise IT security overall, and like other security reports, it calls attention to the threat of...
Posted by Paula Skokowski
It seems there’s an app for just about everything these days, including apps to improve our exercise regimes, our restaurant choices, our driving routes, and even our relationships. In July of 2014, Android users had 1.3 million apps available for download; Apple users, 1.2 million, and those...
Posted by Vidhya Ranganathan
Hackers are increasingly targeting mobile devices, according to a recent report from RSA. As the company’s Daniel Cohen remarked in an interview at BankInfoSecurity.com , the sheer number of smartphones and tablets all but guarantees that hackers will target these popular devices. The growth...
Posted by Yorgen Edholm
The BYOD trend is unstoppable and enterprises are now living in a BYOD-centered world. A mobile workforce of tech-savvy employees is now storing mission-critical business documents on their own devices, ranging from laptops to smartphones to smart watches. Because of this, enterprise apps are...
Posted by Paula Skokowski
The burglar who hit the headquarters office of Sunglo Health Home Services in Harlingen, Texas, broke into one van, found the keys to another, loaded the second van with tools and equipment, and sped off. Then he returned to Sunglo's offices, used a fire extinguisher to smash a window, and...
Posted by Paula Skokowski
The Bring Your Own Cloud (BYOC) phenomenon highlights an important deficit in most enterprise IT mobile efforts. Mobile workers are signing up for personal cloud services to get their work done, because they need immediate access to essential work content across all their devices including...
Posted by Vidhya Ranganathan
From our conversations with customers, we know that a growing number of enterprise organizations are developing their own mobile apps. Many enterprises—especially those in financial services, healthcare, and government—are discovering firsthand the challenges of building security into...
Posted by Paula Skokowski
One size definitely does not fit all when it comes to enterprise applications. With the invasion of mobile devices into the enterprise, enterprise applications are being stretched to the limit by workers trying to access apps designed for a 24 inch screen on a 5 inch smartphone. To get a sense for...
Posted by Vidhya Ranganathan
At the same time that mobile computing is boosting productivity, it’s creating new security vulnerabilities that put enterprise content and networks at risk. For instance, mobile malware continues to grow in sophistication and number of forms of attack. Between Q1 2013 and Q1 2014, mobile...
Posted by Yorgen Edholm
In a recent study of mobile workers, 93% reported that their productivity had increased because of mobile technology. However, most of the productivity increases resulted from traditional applications such as email, telephony, and remote desktop software, rather than from new mobile apps. For...
Posted by Vidhya Ranganathan
Recognizing the risk that BYOD security lapses pose for businesses and other organizations, the UK government has issued a sweeping collection of BYOD security recommendations. The recommendations include policy recommendations for management teams as well as OS-specific recommendations for IT...
Posted by Accellion Team
Even after Apple’s stunning introduction of the Apple Watch, wearable technology is in its infancy. Mr. Cook’s team took a big step forward in terms of wearable application development, but it remains to be seen how consumer adoption will translate into more meaningful, life-critical...
Posted by Yorgen Edholm
A few days ago, we posted Part I of our 10 predictions for enterprise mobility in 2015. The suspense is over. Here’s Part II: Wearable Technology In 2015, wearables will find their way into the enterprise. It’s only a matter of time before these devices alter the way companies look at...
Posted by Yorgen Edholm
It’s December—time for looking back at the year just finished. 2014 was a big year for us at Accellion. We introduced our kiteworks platform and saw our secure mobile solutions adopted by leading enterprises in markets as diverse as healthcare, finance, retail, law, government, and...
Posted by Yorgen Edholm
More U.K. employees are using mobile devices for work, but many of these workers are careless about mobile security. This carelessness is creating new security risks, that attackers are exploiting, which is especially risky during the holidays when more workers than normal may be accessing content...
Posted by Yorgen Edholm
A new survey of IT professionals by Dimensional Research makes two things abundantly clear: The most important vulnerability in enterprise mobile security is employee behavior. 87% consider careless employees a greater threat than cybercriminals. “Employee actions have the highest impact on...

Pages