Moving security beyond the generational divide
At RSA Conference 2020, Ben Smith addressed the need to consider generational differences in the workplace when creating a security strategy.
23 articles
At RSA Conference 2020, Ben Smith addressed the need to consider generational differences in the workplace when creating a security strategy.
Employees going away for the winter break? We explain what to do to keep trips from turning into corporate data leaks.
Kaspersky Lab recently announced that it has patented a new technology for protecting corporate data on employee mobile devices.
Kaspersky Lab has rolled out a new cyberthreats report covering Q2. While it is consumer-oriented, certain findings are extremely relevant to business.
Most of the security announcements surrounding Windows 10 business-oriented, as they address the primary IT security problems businesses have to face. Judging by those announcements, Microsofts seems to address the issues properly.
It looks like the development of BYOD in the commercial sector has outrun the recognition of the risks it poses. It’s worth mentioning, however, that similar risks are posed by any new “invasive species” of tech, and there is nothing unseen with BYOD.
iOS-based devices have a large share in the enterprise, which assures a strong demand for BYOD-oriented security features. A number of them arrive in iOS 8.
IT staff of various companies complain that employees are slow to report losing their mobile devices. Thanks to BYOD, the responsibility for those devices now appears to be shared.
Preparing to watch your child trundle off to school with these expensive devices in their backpacks will be a lot easier if you guard against the many perils that can threaten them – theft, malware and unwanted Internet browsing chief among them.
The worldwide spread of corporate initiatives like IT Consumerization and Bring Your Own Device makes it necessary to build a return on investment (ROI) model in these promising areas. The
On the web you can find regular discussions about how people used to live without mobile phones. Somehow people lived without them until quite recently, but now it seems unimaginable.
In a recent post we wrote about how the line between “work” and “personal” devices today is increasingly blurred. Users will not buy a separate smartphone or a tablet for
Samsung, maker of handsets and all devices tech-related, has created a secure Android environment called Knox, which aims to resolve the laundry list of security problems facing IT teams as
88% of tablet users and 96% of smartphone owners use personal devices to store important personal information. These figures are from the survey B2B International and Kaspersky Lab cooperatively conducted
The number of IT security incidents involving smartphones and tablets is on the rise, and most companies have no plans to limit the use of personal mobile devices for work-related
MDM systems are often not necessary right away for companies with a small number of mobile workers, whose managers often believe their IT-department can handle it effortlessly. But a reality
A modern man cannot imagine his life without mobile devices like smartphones and tablet computers. A portable minicomputer that provides access to the Internet and offers basic features for processing
When we think of information security, we tend to think of external hackers and cyber-criminals fighting their way inside an organisation’s network to steal its information. Clearswift commissioned some research
Continued from Part I Smartphones and Tablets Smartphones and tablets are no different from PCs in terms of the amount of corporate data stored on them. E-mail access, corporate documents,