Insider threats remain a worry – but enterprises getting better at detecting it

(c)iStock.com/Jirsak

The latest research note from data protection provider Bitglass has found that three quarters of organisations feel vulnerable to insider threats, while one in three had experienced an insider attack during the past year.

The report, around insider threats in the enterprises which polled more than 500 cybersecurity professionals, argued that the main concern among organisations is leaks due to unsanctioned app usage, cited by 71% of respondents. Negligence (68%) and malicious insiders...

By James Bourne, 30 September 2016, 0 comments. Categories: Collaboration, Enterprise Mobility, Privacy, Security.

Should vendors be forced to give encrypted data to the government?

(c)iStock.com/maxkabakov

More than one in three IT pros believe cloud providers should be forced to give government access to encrypted data, according to the latest research study from the Cloud Security Alliance and data protection providers Bitglass.

The research, which appears in a report entitled Mitigating Cloud Risks, surveyed 176 information security professionals and found US-based respondents were more likely to be opposed to government information (64%) than their EMEA counterparts (42%). 10% of...

By James Bourne, 11 August 2016, 0 comments. Categories: Cloud , Data & Analytics, Privacy, Security.

Skype for Business gets solid user feedback – but mobile issues need to be ironed out

(c)iStock.com/svariophoto

It has been almost a year and a half since Microsoft announced it was reskinning and revamping Lync as Skype for Business – so are users satisfied with their experience? In a word: yes. In two words: yes…but.

A new study released today from Osterman Research and Unify Square, a unified comms vendor with a specific Redmond focus, finds more than half (52%) of...

By James Bourne, 12 July 2016, 0 comments. Categories: Collaboration, Enterprise Mobility, Microsoft, Privacy, Productivity.

Research warns of yet more lax employee mobile security practices

(c)iStock.com/allvisionn

One in five employees share their work email passwords, while 12% share passwords to other work applications, according to new research data released by identity and access management provider OneLogin.

The study, conducted by Arlington Research of more than 1,000 US-based respondents in May this year, also found one in five workers do not bother with additional security software on their devices, beyond what ships with the operating system, while employees admit to letting their...

By James Bourne, 04 July 2016, 0 comments. Categories: Employee Education, Employees, Enterprise Mobility, Privacy, Research, Security.

Bitglass warms of ‘MDM mayhem’ in latest research

(c)iStock.com/erhui1979

Cloud access security provider Bitglass has warned of ‘MDM mayhem’ in the results of its latest study which argues mobile device management (MDM) software contains major privacy issues for users.

The report got volunteers to test unnamed MDM products for a week, and through routing mobile traffic through a corporate proxy, normally used in MDM to inspect traffic for malware, found a number of alarming findings, from being able to see employees’ personal email inboxes...

By James Bourne, 24 June 2016, 0 comments. Categories: Enterprise Mobility, MDM, Privacy, Security.

The key to unlocking Identity 3.0 – and avoiding the hell of “crap” passwords

(c)iStock.com/AnthiaCumming

Identity is almost irretrievably broken – and those who are trying to fix it are going entirely the wrong way about it.

That was the underlying theme from an entertaining talk by Paul Simmonds, CEO of the not-for-profit Global Identity Foundation at Cloud and DevOps World, which puts a focus on finding a global identity solution which is privacy enhancing and globally scalable.

Pulling no punches in the early stages – describing passwords as “really crap”...

By James Bourne, 22 June 2016, 0 comments. Categories: Data & Analytics, Data Loss, Identity, Privacy.

Businesses receive another warning over the threat of DDoS attacks

(c)iStock.com/Sergey Nivens

We have all heard the stories of businesses which have suffered debilitating DDoS attacks and, in some cases, succumbing altogether. Take Code Spaces, the web-based SVN and Git hosting provider which suffered such an attack in June 2014 that it was forced to wave the white flag and cease trading after recovering all the data lost would cost too...

By James Bourne, 16 June 2016, 0 comments. Categories: Privacy, Security.

Microsoft toughening up password requirements – but is it too late?

(c)iStock.com/frenky362

It is an issue that has rumbled on for as long as most of us can remember – but now Microsoft aims to make the dreaded password a little bit safer by banning easy passwords.

The news comes amidst a series of data breaches; the LinkedIn data breach which hit the news last week – albeit not containing any new data from beyond the previous breach in 2012 – being chief among them. Since then however, it has emerged that hackers have stolen up to 65 million Tumblr...

By James Bourne, 31 May 2016, 1 comment. Categories: Authentication, Employees, Enterprise Mobility, Privacy, Security.

Enterprise compliance and productivity: Should emails have a keep by date?

(c)iStock.com/peshkov

A recent report by Radicati revealed that the number of business emails sent and received per user per day in 2015 was 122 and predicted that this will rise to 126 by 2019. That is a lot of emails and a lot of data. Add to that the growing trend for workers to store information in email inboxes, rather than saving down on file, and it has led lots of businesses and developers to...

By Robin Bingeman, 18 May 2016, 0 comments. Categories: Data & Analytics, Employees, Privacy, Security.

VMware launches AirWatch 8.3, bangs drum for UX and privacy

(c)iStock.com/Jaap2

VMware has announced the launch of AirWatch 8.3, an updated version of the Atlanta-based enterprise mobility provider’s platform which includes integration with the recently released Workspace ONE among other new features.

The move again links into VMware’s vision of ‘consumer simple, enterprise secure’, with the company pushing the part of greater user experience as well as greater transparency in privacy. In the case of the latter, the website

By James Bourne, 17 February 2016, 0 comments. Categories: Enterprise Mobility, Privacy, UX.

How new security solutions will be a major enabler of the mobile enterprise

(c)iStock.com/piranka

Within the past few months, we have seen numerous initiatives by enterprise mobility providers to support the growing number of mobile-empowered enterprises.

On January 5 AirWatch by VMware announced its collaboration with Intel Security. The reason for these two giants to team up was to address the most...

By Sarah Green, 09 February 2016, 0 comments. Categories: Enterprise Mobility, Privacy, Security.

Verizon warns of bigger, more frequent enterprise data breaches in 2016

(c)iStock.com/weerapatkiatdumrong

Telco giant Verizon has sent out a gloomy warning: regardless of the doubling down on enterprise security, 2016 will see even more, even higher profile data breaches.

The company has released nine predictions for enterprise IT, and alongside the security snafu, Verizon also predicts a shift from the more traditional enterprise security methods to fit more with user need, leading to a more ‘common sense’ approach which will enable chief security officers to focus...

By James Bourne, 19 January 2016, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Privacy, Security.

Why mobility is moving faster than the CSO

(c)iStock.com/erhui1979

The future

Alice begins her workday staring at a white wall in order to get the best resolution with her smarteye. The smarteye contact lens projects light into her retinas having the best contrast with a colourless background. Reading midway through the morning news blogs, she receives a gentle tap from her outdated smartwatch. The tap indicates her IoT coffee maker received the trending brew formula from a cyber roaster and has completed its automated task.

She brings a 3D printed...

By MobileIron, 15 January 2016, 0 comments. Categories: Applications, Authentication, Enterprise Mobility, Privacy, Security.

Mobile security: Why you’re not getting fooled again

(c)iStock.com/piranka

By James Plouffe, Solution Architect, MobileIron

It’s hardly uncommon for security policies and tools to be perceived as draconian or invasive. The consensus is that— more often than not— they hinder rather than help the day-to-day efforts of most employees.

Looking at the way these tools have traditionally operated, it’s easy to be cynical: everyone can picture the seemingly endless prompts to update anti-virus signatures, the performance impact of scheduled...

By MobileIron, 16 October 2015, 1 comment. Categories: Enterprise Mobility, Privacy, Security.

The employee strikes back: Workforce steadily refuses BYOD while MAM is ‘DOA’

(c)iStock.com/Andrey Popov

A new report from Bitglass has revealed that more than half (57%) of end users polled do not participate in a company BYOD program because they do not want employers’ IT departments to have visibility into their data and applications.

The paper, entitled ‘BYOD Security 2015: Rise of the Employees’, conducted two surveys on BYOD adoption and challenges with 2000 regular employees and 227 IT security professionals quizzed. Bitglass argues that while BYOD has room to...

By James Bourne, 22 September 2015, 0 comments. Categories: Employee Education, Employees, Enterprise Mobility, Privacy.

AirWatch’s announcements on privacy, Windows 10, ACE and more: What you need to know

Picture credit: AirWatch by VMware

With the latest AirWatch Connect event coming to town, the enterprise mobility management (EMM) provider has packed several announcements together in one fell swoop. Here are the most important points from the plethora of news coming out of Atlanta today:

Privacy first

The one big take away from the AirWatch press conference was stressing a greater need for user privacy. With that in mind, the EMM vendor has announced the AirWatch Privacy First program, which aims to give...

By James Bourne, 22 September 2015, 0 comments. Categories: Enterprise Mobility, Privacy, Security.

Business use of encryption to avoid data breaches goes up – but still a long way to go

(c)iStock.com/MilesSherrill

Government and healthcare has accounted for almost two in three compromised data records, according to the latest research from Gemalto.

The data, taken from the digital security provider’s Breach Level Index, found data breaches increased by 10% in the first half of 2015 compared to the year before. Yet despite the number of compromised data records decreasing 41% over the same period – attributed to fewer large scale breaches in the retail industry – plenty of...

By James Bourne, 09 September 2015, 0 comments. Categories: Data Loss, Privacy, Security.

How IoT empowers dialogue on cybersecurity, privacy, and identity and access management

(c)iStock.com/stellalevi

By Joni Brennan and Oleg Logvinov

It is a counterintuitive challenge to begin with. The whole point of the Internet is to make informationmore accessible, but the prevailing question in cybersecurity, privacy and identity and access management (IAM) is how to build an effective framework of complementary technologies and policies for restricting who can access what information when and in what ways.

In the digital transformation that is well underway with Internet of Things (IoT) and...

By IEEE, 14 August 2015, 0 comments. Categories: Big Data, Cloud , Identity, IoT, Privacy, Security.

Research report reveals laissez-faire attitude to cyber risk by enterprise

(c)iStock.com/Todd Keith

Does your organisation have a complete understanding of cyber risks? If you answered yes to that question, then you’re in limited company. According to Marsh’s latest cyber risk survey report, the number of UK companies who are fully confident in their cyber security operations is less than one in five (18%) – down on last year.

More than half (52%) of those polled said they had a ‘basic’ understanding of their business’ exposure to cyber risk,...

By James Bourne, 17 June 2015, 0 comments. Categories: Employees, Enterprise Mobility, Privacy, Security.

2014 data breaches by the numbers - and their impact

(c)iStock.com/hh5800

A year ago, I was writing about the 575 million data records lost or stolen throughout 2013, a sum based on the data collected by the Breach Level Index that seemed astonishing at the time. The Target breach that happened at the end of that year stood out for me as the epitome of a changing infosec landscape, in which a breach not only caught the attention of industry experts, but also warranted weeks of mainstream media...

By SafeNet, 12 February 2015, 0 comments. Categories: Authentication, Privacy, Security.