Tag Archives: security

Making Secure Enterprise Mobility a Reality


Making Secure Enterprise Mobility a Reality

Enterprise mobility is taking the IT world by storm. One of the most prominent trend shifts over the last year has been the wide-ranging adoption of enterprise mobility in the business world. An on-the-ground transformation of this trend has been the shift away from the tunnel-like focus on mobile applications. A complete digital transformation is required within the enterprise, and enterprise mobility is a definite way forward. Continue reading

Internet of Everything – Security Concerns In a Connected Era


securing IoT

Imagine a world where every aspect of your life is connected. What you do is recorded by a growing number of connected devices you touch, interact and encounter every day. And then the collected data is shared over a network. Our world is becoming a central nervous system running on a network of connected devices.

By 2020, the number of internet-connected devices will reach 50 billion. Mathematically, that’s around 8 connected devices per person. And this indeed creates a simple but a dangerous dilemma. While our ability to collect data will grow via connected devices, there is hardly any adequate security system in place to protect and secure this data. Continue reading

Mobile & Cloud – The Top Security Concerns of 2016


top security concerns of 2016Mobile security challenges:

The mobile has taken center stage in all aspects of life, but its influence is perhaps most noticeable in the corporate sector where the influx of mobile technologies has brought a sea change in the way enterprises operate. The proliferation of mobile has naturally led to concerns regarding security.

Today, 2 out of 3 employees use their mobiles for work-related activities. More and more companies are adopting BYOD’s at their workplace. Mobiles have become a mine of sensitive corporate information and a probable entry point in the IT. In the event of a mobile getting lost or stolen, there is a high chance of sensitive data falling into the wrong hands. For example, according to OCR, there were 253 breaches affecting more than 500 individuals, and running into a combined loss of over 112 million records in healthcare sector. And in Japan, at least 2.07 million sets of personal data were stolen or feared leaked from 140 organizations in 2015, according to a Kyodo News survey. In automobile sector, Mercedes has filed a lawsuit against Benjamin Hoyle (the company’s former employee) for stealing confidential information before leaving to join a rival company. These are perilous security incidents that corporates and companies cannot overlook.
Continue reading

Educating Security Professionals on Virtual Technologies


education security

Network systems and applications are advancing in terms of technology every day. To keep an organisation safe from the threats related to data security, it is essential for security professionals to get a hands-on experience of the latest applications and software.

Data protection solutions discover and control information access by active users. Professionals who constantly keep track of the data security need to learn and understand new software programs that help in better data management. A robust plan on the use or application of technologically advanced software will help security professionals to keep their organisation safe from threats. Continue reading

Threats Due to Technological and Social Trends


Cyber-crimes are a fast developing reality. The year 2014 recorded the highest number of cyber threats and data ruptures. And the risk of cyber-crimes is only expected to increase this year.Here are some major threats associated with technology and social media.

BYOx at workplace

The“bring-your-own” trend is commonly seen in many organisations and few have developed policies to deal with it. Since the trend of bringing mobiles, applications and other devices is popular among employees, there is a high risk of security being compromised. The risk involved in unauthorised access can be a cause of both, internal and external threats. Other causes of threats would include unreliable business applications and misuse of the device. Continue reading

Building a Sustainable Mobile Infrastructure


According to a new mobile phone forecast from the International Data Corporation (IDCWorldwide Quarterly Mobile Phone Tracker, worldwide smartphone shipments reached a total of nearly 1.3 billion units in 2014, representing an increase of 26.3% over 2013. Looking ahead, IDC expects 1.4 billion smartphones to be shipped worldwide in 2015 for a 12.2% year-over-year growth rate. Continue reading

5 Key Aspects for a Robust Enterprise Security Management Strategy


Consider these alarming statistics:

  • Studies have revealed that on an average, companies are attacked about 16,856 times every year[1]
  • In 2013, between 68% and 82% of the S&P 500 companies had their internal systems compromised with external eventualities[2]

If you psychologically analyze an enterprise, you will observe that most organizations scale up their security infrastructure only after a breach! As to why they behave the way they do, is because of the issue of disrupting the functioning business critical operations. Continue reading