Losing ZZZ’s Over BYOC

The high-tech world has no shortage of acronyms. DLP, NAC, TCP, WAN, Wifi– the list goes on and on, making it tough to keep track of the latest buzzwords. Perhaps one of the most widely used acronyms currently is BYOD- the much talked about trend of employees bringing their own devices into the enterprise and the security challenges created as a result.

Well, get ready, because there’s a new acronym that’s entered the fold: BYOC. Bring Your Own Collaboration.

Who Controls the Keys to Your (Data) Kingdom?

True or false? When you share your information with a public cloud service, you give up “ownership” rights to that data? Well, as some Twitter users can tell you, when an official legal request is involved, that statement is definitely true.

An iPhone for Everyone: Is that a Sound Mobile Strategy?

As expected, Apple announced the much-anticipated iPhone 5 at this week’s media event to great fanfare and we expect once available it will immediately become part of the BYOD mix.

Get In Control of Sync - Perception of Security is Not Enough

Do you remember the first document you saved on a thumb drive? It used to be that employees wouldn’t leave the office without one – routinely saving board slides and keynote presentations on these mini storage devices. While still a popular giveaway at tradeshows (how many have you stockpiled over the years?), the idea of having corporate data floating around unprotected is too risky of a proposition for an enterprise of any size.

Customer Spotlight: Texas Juvenile Justice Department takes action to protect youth data.

For the Texas Juvenile Justice Department (TJJD), the ability to communicate quickly and securely makes all the difference for the youth they serve. Operating dozens of treatment facilities, correctional institutions and halfway houses throughout the state, TJJD needed a way for its 2,500 employees to share confidential data efficiently and reliably between parents, medical staff and legal counsel.

Missing: My Phone; Sizeable Reward for Ignoring Corporate Data

If it hasn’t happened to you, consider yourself lucky: misplacing your phone is never a great feeling. While you might immediately think of lost contacts, to-do lists, and calendar items, IT administrators have much more serious concerns on their minds, including the possibility of corporate data getting into the wrong hands.

Cloud Security and Storage Snafus Cause Alarm

Service outages, application access errors, and security hiccups – that’s exactly what we’ve seen happen in recent months with cloud storage providers Dropbox, YouSendIt, and Box. All were reported to have experienced unexpected issues:

“The Met” Safeguards The Olympic Torch

We’re just hours from the Opening Ceremony for the 2012 Olympic Games, marked by the arrival of the Olympic torch in London. The torch is ready for a place to call home, as it’s been on an intense journey through more than 1,000 cities and towns in the U.K over the past 70 days.

“What You Don’t Know Can Hurt You: File Sharing and DLP”

Product development plans, quarterly reports, partner SOWs, customer account data, design specs – the list of proprietary data that you need to keep safe goes on and on. So often, data security conversations focus on external threats – due to the huge uptick in malware and security breaches – yet, you can’t ignore risks lurking within your own company walls.

Bringing the Tour De France to Your Living Room

With the 99th Tour de France underway, Australians are paying special attention to the daily rankings, with all eyes on native, Cadel Evans. He captured the title last year (the first Australian to earn the honor), leaving many to wonder – can he pull out the victory two years in a row?

Pages

Subscribe to RSS - blogs