Healthcare becoming more mobile but one in four firms concerned over MDM

(c)iStock.com/BrianAJackson

More than a quarter of healthcare organisations are less than confident in their chosen mobile device management (MDM) in batting away security attacks, according to a new report from Jamf.

The study, which was conducted by analyst firm Vanson Bourne, found a refreshingly high number of healthcare firms going in with mobility at the outset; 83% say they currently provide mobile devices to caregiving staff. Yet the same number cited security as the highest priority concern with...

By James Bourne, 23 January 2017, 0 comments. Categories: Enterprise Mobility, MDM, Security.

Why healthcare is a vulnerable sector for cyber attack – and what can be done about it

(c)iStock.com/jackaldu

2017 is set to feature greater attacks on internet security; the broad adoption of IoT seen to be easily compromised coupled with data often held on legacy systems is likely to capture attention.

Healthcare represents one of the sectors vulnerable to IoT attacks. As more and more people adopt smart wearables and mobile apps tracking fitness the bank of hackable data for cyber criminals is growing and the value of the information is increasing which makes attacking more rewarding....

By Duncan Hughes, 17 January 2017, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Security.

Mobility investments moving more towards the business – but is this the full story?

(c)iStock.com/erhui1979

How are organisations investing in mobile technology, and what will 2017 bring? These are among the questions that Nick McQuire, VP enterprise at CCS Insight and contributor to this publication, has been exploring in his recent work.

The latest edition of CCS Insight’s enterprise IT buyers survey landed at the very back end of 2016, with lots of continuity but some interesting and challenging findings. The study, which quizzed 400 mobile technology decision makers in Europe and...

By James Bourne, 16 January 2017, 0 comments. Categories: Enterprise Mobility, Microsoft, Security.

Arxan acquires MAM provider Apperian to enhance mobile and IoT operations

(c)iStock.com/Maxiphoto

Application security provider Arxan Technologies has announced the acquisition of mobile app management (MAM) provider Apperian to help its mobile and Internet of Things (IoT) push.

Discussions between the two companies had been going on for almost a year with a plethora of options on the table, from strategic partnerships to investment, before settling on acquisition because both companies’ management “felt that there were so many synergies that the companies could maximise impact and...

By James Bourne, 11 January 2017, 0 comments. Categories: Applications, Enterprise Mobility, M&A, MAM, Security.

The weapon of openness, or how open email benefits productivity and security

(c)iStock.com/merznatalia

“The best weapon of a dictatorship is secrecy”, said the Nobel Prize-winning physicist Niels Bohr. “The best weapon of a democracy should be the weapon of openness.”

It’s a principle that goes far beyond politics. The rapid advance of technology has led to a significant increase in the amount of data companies are collecting, and this, in turn, has effectively created two kinds of corporate environment: those where knowledge and information are shared...

By Peter Linas, 10 January 2017, 0 comments. Categories: Employees, Security.

Bitglass secures $45m in new funding to bolster EMEA expansion

(c)iStock.com/Gizelka

Enterprise data security provider Bitglass has announced it has raised $45 million in series C funding, five weeks after announcing it was expanding to the EMEA region.

The round, which featured new investor Future Fund alongside existing investors Norwest, NEA and SingTel Innov8, brings the company’s total funding to $80m, with the company saying it will use it to expand in EMEA,...

By James Bourne, 06 January 2017, 0 comments. Categories: M&A, Security.

IoT and mobility: The two main pillars of digital disruption

(c)iStock.com/Starcevic

By Chris Hale, Vice President of Marketing, Stratix Corporation

The lines have blurred between two massive technology forces driving changes in businesses everywhere: Internet of Things and mobility.

For example, what’s considered a “device”?  In the realm of enterprise mobility, we think mainly of smartphones and tablets equipped with apps and Internet connectivity. Smartphones are packed with sensors that collect data on location, orientation, acceleration,...

By Stratix, 05 January 2017, 0 comments. Categories: Enterprise Mobility, IoT, Security.

Why App Transport Security can’t get here soon enough

(c)iStock.com/Prykhodov

What is completely transparent but protects you from prying eyes? Encryption, of course! “Completely transparent” may be a bit of an overstatement but, generally speaking, the way encryption operates is fairly painless for the average end user. However, with the January 1, 2017 deadline looming for requiring all App Store apps to utilize App Transport Security (a.k.a. ATS, Apple terminology for securing all app traffic using the TLS v1.2 protocol), encryption may get a...

By MobileIron, 23 December 2016, 1 comment. Categories: Enterprise Mobility, iOS, Security.

The key factors in reducing the BYOD mobile security threat

(c)iStock.com/PeopleImages

In its latest report, research firm Ovum reveals that 47% of employees now use their own smartphones to access corporate data, a quarter use a tablet, and 8% use wearables to access information in some form. It’s clear that BYOD is an established feature in today’s always-connected, always-contactable business landscape, and organisations therefore need to put secure mobility management measures in place. What are the principle considerations to bear in mind for this...

By Dave Schuette, 22 December 2016, 1 comment. Categories: BYOD, Employees, Enterprise Mobility, Security.

Appthority warns only 3% of enterprise apps comply with upcoming Apple security mandate

(c)iStock.com/Mikko Lemola

Apple is making a series of security changes for the new year – yet according to new research from Appthority, only 3% of enterprise apps are fully compliant with the new security mandate.

The research, which examined the top 200 iOS apps installed on enterprise devices worldwide, showed a relatively meagre proportion of apps which fully meet App Transport Security (ATS) data encryption requirements.

More than half (55%) of apps allow use of HTTP, instead of requiring HTTPS...

By James Bourne, 08 December 2016, 0 comments. Categories: Applications, Enterprise Mobility, Security.

UK employers need to face up to encryption issues, survey argues

(c)iStock.com/LeoWolfert

UK workplaces suffer from poor encryption leading to corporate data risks, as well as the use of unprotected and unauthorised devices, according to a new survey from WinMagic.

The study, which polled more than 1,000 employees, found that 42% use devices which are not provided by their employer to cope with corporate emails and files – in other words, BYOD – and more than half (52%) use personal online accounts to store or access work files, with the biggest offenders being...

By James Bourne, 06 December 2016, 0 comments. Categories: Data & Analytics, Employees, Enterprise Mobility, Security.

Bitglass expands to EMEA to meet ‘rising demand’ for cloud and mobile protection

(c)iStock.com/FrankRamspott

Enterprise data protection provider Bitglass has announced its expansion into the EMEA region, with the appointment of Eduard Meelhuysen, previously at Netskope, aimed to grow the sales arm and partner network.

The company, which was founded in 2013, offers a cloud access security broker (CASB) product, which aims to sit and protect between an organisation’s on premise infrastructure and cloud infrastructure. Gartner defines it as “on-premises, or cloud-based security...

By James Bourne, 01 December 2016, 0 comments. Categories: Cloud , Enterprise Mobility, Security.

Turning your people into your most effective defence: A different approach

(c)iStock.com/Jirsak

Board meetings will never be the same again! Since the very public cyber-attack on TalkTalk in the UK in late October 2015 and following numerous other high profile CEO apologies, business leaders are now realising the real damage that a cyber-attack can have on their organisation. Hard-won reputations­­ – ­­­both corporate and personal – competitive advantage and market value are all at risk.

The gap between awareness and understanding

Chief executives and...

By Nick Wilding, 21 November 2016, 0 comments. Categories: Employee Education, Employees, Security.

Zimperium: 60% of one company’s devices vulnerable to known cyber threats

(c)iStock.com/Grassetto

Don’t shirk from asking the tough questions, and realise mobile is your greatest cyber vulnerability. That’s the advice mobile security provider Zimperium is giving to organisations as it reveals insights from its Global Threat Intelligence lab.

The company adds that 60% of mobile devices in enterprise BYOD environments are vulnerable to known cyber threats, according to data from one customer with 7,000 mobile devices, and that companies have opened themselves up to an...

By James Bourne, 18 November 2016, 0 comments. Categories: BYOD, Employees, Enterprise Mobility, Security.

Gemalto warns over mobile app security ecosystem in latest report

(c)iStock.com/Jirsak

Plenty still needs to be done in order to create a better enterprise app ecosystem both in terms of user experience and security, according to the latest research from security provider Gemalto.

The study, which polled users across several continents and featured in a report titled ‘Building Trust in Mobile Apps’, argues reliability and security are the primary concerns for users on paid apps, with two thirds (66%) of respondents saying they would make more transactions if...

By James Bourne, 09 November 2016, 0 comments. Categories: Applications, Enterprise Mobility, Security.

IT execs note how cyber attacks could have been prevented in latest research

(c)iStock.com/MilesSherrill

More than 40% of companies polled by IT and cloud management provider NetEnrich admit they have been victim to a cyber attack, with stolen or weak passwords the primary cause.

Yet the research, released today which polled 174 respondents over a 24 hour period, also found that for 43% of those polled, attacks could have been prevented with a better policy in place.

More than a quarter (26%) of respondents said that stolen or weak passwords were the most common reason an attack took...

By James Bourne, 03 November 2016, 0 comments. Categories: CIO, Employees, Security.

Research reveals iOS and Android app data leakage – and what it means for enterprises

(c)iStock.com/ConstantinosZ

A new report from cloud security provider Zscaler has revealed the extent of data leakage from iOS and Android apps – and the threat this poses to enterprises.

In a blog post entitled ‘Are mobile apps a leaky tap in the enterprise?’, the company analysed more than 45 million transactions related to mobile devices through its cloud, and found that 0.3% of the 20 million Android transactions and 0.5% of the 26 million iOS transactions are resulting in some level of...

By James Bourne, 25 October 2016, 1 comment. Categories: Android, Applications, Enterprise Mobility, iOS, Research, Security.

Why the CIO landscape remains a challenge with digital disruption

(c)iStock.com/Akindo

The environment for CIOs remains a challenging one in the face of digital disruption. A new report from Logicalis argues that CIOs have less control over IT spending than ever before, and are increasingly looking at partner-led services as a result.

The study, the IT solutions provider’s 2016 global CIO survey which polled more than 700 CIOs worldwide, found that, for two in five respondents, they make less than half of the decisions on IT spending.

73% of firms surveyed are now...

By James Bourne, 24 October 2016, 0 comments. Categories: Applications, CIO, Cloud , Security.

New research underlines challenges for enterprise IoT device security

(c)iStock.com/DrAfter123

While the Internet of Things (IoT) is playing an increasing role in a range of business processes, it leads to extended IT attack surfaces – and traditional tools are falling short on the security side.

That’s the verdict from a new report commissioned by ForeScout Technologies and conducted by analyst firm Quocirca. The survey, which polled more than 200 senior IT decision makers across the UK and central Europe, found that 65% of respondents are less than sure about...

By James Bourne, 21 October 2016, 0 comments. Categories: IoT, Security.

Skycure gets AT&T on board for mobile security partnership

(c)iStock.com/RiverNorthPhotography

Mobile threat solutions provider Skycure has announced that AT&T will resell the Skycure Mobile Threat Defense Platform, helping secure personal and business data on the millions of devices of AT&T business customers.

The company cited research from Information Security, an IT security community on LinkedIn, back in April which argued that one in five organisations analysed had suffered a mobile security breach primarily driven by malware and malicious Wi-Fi, while...

By James Bourne, 19 October 2016, 0 comments. Categories: Enterprise Mobility, Malware, Security.