Mobility for enterprise
734 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Apptimate
Scoop.it!

Learning To Trust Cloud Security

Learning To Trust Cloud Security | Mobility for enterprise | Scoop.it
Cloud-centric computing is inevitable, so you need to face your concerns and be realistic about risks.
Apptimate's insight:

The cloud is already upon us, whether you like it or not. It's like mobiles, your employees can't live or work without them. And all this is actually good. Your business needs speed to survive. Speed, agility, flexibility and security, and all those things are provided by the mature cloud suppliers, provided better than you can do yourself in your own datacenter. They live on managing customer data and doing it securely. With a bad rep they die, so they focus much more effort, employ the brighter security guys, etc. Because it's their business to do so.

 

Your business is yours, their business is providing secure resources to you. It's time to trust them.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

10 mobile security myths that need debunking - TechRepublic

10 mobile security myths that need debunking - TechRepublic | Mobility for enterprise | Scoop.it
Mobile devices have introduced plenty of legitimate concerns, but there are some misconceptions floating around that may lead companies to focus on the wrong issues--or to ignore the real risks.
Apptimate's insight:

A smartphone is a portable computer, nor more, no less. And should be treated as such from a security point of view. The only thing that really differs is that the phone more or  less always communicate on public networks outside firewalls.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Slideshows - Dark Reading

Slideshows - Dark Reading | Mobility for enterprise | Scoop.it
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
Apptimate's insight:

6 ways to keep your Android phones safe

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Evaluating the security of the top enterprise apps - Help Net Security

Evaluating the security of the top enterprise apps - Help Net Security | Mobility for enterprise | Scoop.it
Wandera announced the findings of a comprehensive security assessment of the top enterprise apps used on corporate mobile devices by enterprise customers.
Apptimate's insight:

10 out of the 10 apps are vulnerable to at least three of the OWASP Top 10 Mobile Risks, including the two most fundamental issues: data storage security and data transport security.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

IT admits obstacles to user mobility due to security concerns

IT admits obstacles to user mobility due to security concerns | Mobility for enterprise | Scoop.it
Organizations are challenged to meet demands for greater mobility as 92% of IT departments worldwide still restrict users from accessing sen...
Apptimate's insight:

Mobility is finally being top priority, but the approach is still traditional IT security and not Mobile First security. Multi-factor authentication is an absolute necessity, and so is point-2-point encryption. Mobiles communicate over public networks.


VPN was not built for the asynchronous behavior of mobile networks, with varying bandwidth and drop outs, so your solution cannot rely on old tech like VPN. 


So there is a strong need for an extra layer of security, app security, where only the app has access to corporate data and only communicates according to user credentials and user situation with raised authentication requirements when necessary.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Businesses Lack Protection Against Mobile Data Breaches

Businesses Lack Protection Against Mobile Data Breaches | Mobility for enterprise | Scoop.it
Nearly three-quarters (74 percent) reported their organization has experienced a data breach as a result of a mobile security issue, the survey found.
Apptimate's insight:

If users turn to ShadowIT, it's because the IT department doesn't provide them with the right tools to do their job. The workload on the users is always increasing and since their priority is to fulfill their tasks they will take shortcuts if the systems don't support them. So it must be your top priority to support them, or your security policies and investments are worth nothing.


Instead of policies you need to provide the right tools. Selected secure apps that the user likes or at least accepts. In-house developed or new cloud-based services. There is a lot going on in the Mobile IT arena. Evaluate and select tools and take that quantum leap into modern user behavior.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Mobile security 101: Eight must-haves to protect mobile data

Mobile security 101: Eight must-haves to protect mobile data | Mobility for enterprise | Scoop.it
The new EU Data Protection regulation will hold any company or individual that processes data responsible for its protection, including third parties such as cloud providers.
Apptimate's insight:

Mobile devices and access to enterprise systems present new threats and vulnerabilities that must be assessed appropriately to safeguards valuable enterprise assets. By combining these eight important enterprise mobile security methods with a detailed plan and standard procedures, enterprises can secure the mobile enterprise and meet security regulations.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Rethinking Mobile Security - Why Apps Come First | SecurityWeek.Com

Rethinking Mobile Security - Why Apps Come First | SecurityWeek.Com | Mobility for enterprise | Scoop.it
Attackers follow users and the popularity of mobile apps in conjunction with the emergence of their security flaws means that mobile is prime to be the next attack vector that threatens corporate data and user privacy.
Apptimate's insight:

Users are no longer accessing data through a single point, like their company issued computer. The modern employee needs access from where they are, from the tool they have access to for the moment, like their laptop, tablet or smartphone. Even through borrowing someone's web browser. And this is just the beginning. More and more devices will enter the workplace, like wearables, Internet of Things sensors, etc. The old paradigm of securing the device and the connection is not up to par with this new, rapidly changing, environment.


The focus has to change to securing applications that run on multiple devices and platforms. The user must be authenticated in each and every transaction, with authentication method automatically adapting to the digital and physical environment for the moment. For instance, accessing the system from your office computer has a more secure environment and can then have a simpler access control, while accessing the system on a smartphone over a public WiFi at an airport while travelling requires a much more thorough authentication mechanism.


An impossible feat with the EMM and MDM tools commonly used today. We need new inventions and entrepreneurial efforts in this field. And we need it NOW.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Looks like mobile device security is on nobody's mind

Looks like mobile device security is on nobody's mind | Mobility for enterprise | Scoop.it
Despite recent high-profile data theft attacks, much of the American workforce has not taken action to protect information on their personal...
Apptimate's insight:

It's easier and cheaper to put your head in the sand than to adapt to the changing threat landscape. But the threat might still kill you...

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Shadow IT: It's Much Worse Than You Think - InformationWeek

Shadow IT: It's Much Worse Than You Think - InformationWeek | Mobility for enterprise | Scoop.it
The number of unauthorized cloud apps being used in the enterprise is 15 to 20 times higher than CIOs predicted, according to a Cisco report. What's a CIO to do?
Apptimate's insight:

Users are under constant pressure to perform their tasks, disregarding what IT departments has in their policies. Users will take necessary shortcuts and it's up to the CIO to see that the shortest shortcuts are provided by the IT department.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

3 security challenges when deploying mobile apps

3 security challenges when deploying mobile apps | Mobility for enterprise | Scoop.it
Deploying a mobile app securely involves third parties that make security more complicated.
Apptimate's insight:

Mobile is not "just another terminal". The mobile development ecosystem differs from other environments. And it has its own security challenges.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

iPhone passwords for work are a giant pain in the rear, workers say

iPhone passwords for work are a giant pain in the rear, workers say | Mobility for enterprise | Scoop.it
The barrier between work use and personal use has vanished.
Apptimate's insight:

A BYOD program is necessary, but if it means too complicated and irritating mechanisms it will not be used. People will take shortcuts to be able to do their job as effectively as possible. Chose tools carefully!

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

How much of a risk is BYOD to network security? - Help Net Security

How much of a risk is BYOD to network security? - Help Net Security | Mobility for enterprise | Scoop.it
BYOD risk is still a huge issue. Here are four essential steps you should take to increase the security of your company network.
Apptimate's insight:

BYOD is not the problem. It can be managed if you just remove antiquated thinking, processes and technology from your secure network design. Maybe the problem is that your company provided tools aren't fulfilling the needs of the organization so the employees are inventing workarounds just to get their jobs done?

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Apple winning the enterprise security race, Samsung makes push | ZDNet

Apple winning the enterprise security race, Samsung makes push | ZDNet | Mobility for enterprise | Scoop.it
According to a Tech Pro Research survey, Apple is viewed by tech decision-makers as the most secure mobile device option. Samsung is threatening Apple's lead, and Microsoft ranks well on tablets thanks to the Surface.
Apptimate's insight:

Apple has taken the lead in security for mobility

more...
No comment yet.
Rescooped by Apptimate from Secure communication
Scoop.it!

Overwhelming Majority of Android Devices Don't Have Latest Security Patches | SecurityWeek.Com

Overwhelming Majority of Android Devices Don't Have Latest Security Patches | SecurityWeek.Com | Mobility for enterprise | Scoop.it
Although roughly 68% of all Android devices are eligible to receive monthly security updates, the vast majority don’t have the latest security patches applied, a recent report reveals.
Apptimate's insight:

This is alarming news especially for company owned devices. With such a high risk in the end-point it is extremely important to be selective what phones and brands to allow in your network. The only way to force makers and carriers to grow up is to vote with your feet; throw out the crappy suppliers!

more...
Apptimate's curator insight, June 30, 3:53 AM

This is alarming news especially for company owned devices. With such a high risk in the end-point it is extremely important to be selective what phones and brands to allow in your network. The only way to force makers and carriers to grow up is to vote with your feet; throw out the crappy suppliers!

Scooped by Apptimate
Scoop.it!

The Future of Enterprise Mobility — Medium

The Future of Enterprise Mobility — Medium | Mobility for enterprise | Scoop.it
Mobile and IoT strategist Rob Tiffany discusses key trends in the enterprise mobility space and provides a glimpse into the moves companies will be making over the next several years.
Apptimate's insight:

Really insightful about the long maturing process of corporate IT. I especially like the part of CIOs needing to step out of the operation & maintenance box and become business enablers. Otherwise they will not be able to compete for their own position and resources, when the business units give up on them and start moving into SaaS and cloud.


Also, good points about the scaling problem with mobile access, where a user that used to have one computer, now requires access from maybe five devices. 

And then you didn’t even touch on IoT that will come like an earthquake through the legacy systems. The promise of business efficiency might be overturn into a data center “heart failure” situation where everything just gets overloaded. The promise though might be fulfilled if you start your migration into a scalable solution, cloud or whatever, to fulfill the requirements of mobility. Those are the same requirements that come with IoT.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Secure Authentication is the Only Solution to Vulnerable Public Wi-Fi

Secure Authentication is the Only Solution to Vulnerable Public Wi-Fi | Mobility for enterprise | Scoop.it
The vulnerability of public Wi-Fi means businesses need to give their users a single method of authentication to remove security fears.
Apptimate's insight:

Multi-factor authentication is an absolute necessity, and so is point-2-point encryption. Mobiles communicate over public networks.

VPN was not built for the asynchronous behavior of mobile networks, with varying bandwidth and drop outs, so your solution cannot rely on old tech like VPN. 

So there is a strong need for an extra layer of security, app security, where only the app has access to corporate data and only communicates according to user credentials and user situation with raised authentication requirements when necessary.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Your business has suffered a data breach. Now what? | ZDNet

Your business has suffered a data breach. Now what? | ZDNet | Mobility for enterprise | Scoop.it
Mandiant executives offer insight into how the enterprise can minimize the impact of a data breach both before and after a cyberattack.
Apptimate's insight:

Having a security breach is a viable business risk and you should treat it as such. Plan for it!

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Supermassive black hole: A new way to secure mobile devices

Supermassive black hole: A new way to secure mobile devices | Mobility for enterprise | Scoop.it
BYOD is a security nightmare, but there may be a simple way to secure mobile devices. Matt Asay explains.
Apptimate's insight:

App based security, strong encryption and multi-factor authentication are the answer to BYOD and cloud security.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

50% of Millennials Share Data to Unsanctioned Cloud Apps

50% of Millennials Share Data to Unsanctioned Cloud Apps | Mobility for enterprise | Scoop.it
Nearly a third of employees in large enterprises upload and share corporate data to third-party cloud apps without the knowledge of their employer.
Apptimate's insight:


If users turn to ShadowIT, it's because the IT department doesn't provide them with the right tools to do their job. The workload on the users is always increasing and since their priority is to fulfill their tasks they will take shortcuts if the systems don't support them. So it must be your top priority to support them, or your security policies and investments are worth nothing.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Who's afraid of shadow IT?

Who's afraid of shadow IT? | Mobility for enterprise | Scoop.it
One of the biggest disruptions in the IT world is the quantity and quality of SaaS tools. From email and storage, to phone systems and infrastructure, it has never been easier to use top of the range products and scale when your business does. As empowering as these tools are, there is a risk to adopting SaaS that might not be immediately apparent.

Shadow IT is any system or service used inside of a company without explicit approval and deployed using non-IT resources. It was born out of busine
Apptimate's insight:

If users turn to ShadowIT, it's because the IT department doesn't provide them with the right tools to do their job. The workload on the users is always increasing and since their priority is to fulfill their tasks they will take shortcuts if the systems don't support them. So it must be your top priority to support them, or your security policies and investments are worth nothing.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Hacking-as-a-Service Makes Everyone Attack Capable - Darkmatters

Hacking-as-a-Service Makes Everyone Attack Capable - Darkmatters | Mobility for enterprise | Scoop.it
13029316350 Hacking-as-a-Service (HaaS) is fast becoming a business enterprise driven by consumer demand, as well as a competitive development of quality goods and services. The professionalization of this marketplace supports much of the hostile activity being observed on the Internet. These underground repositories are competitive, offering products of varying price points and capability for the consumer. Perhaps more disconcerting is the fact that this type …
Apptimate's insight:


Hacking turns into a big business. With high profitability and much less risk than traditional criminality, like robbery, trafficking or drugs it attracts the organized unscrupulous. You can also "address a global market" with your criminality, not just the neighbourhood back allies.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Tackling the Seven Deadly Sins of Mobile Security

Tackling the Seven Deadly Sins of Mobile Security | Mobility for enterprise | Scoop.it
Fortunately, businesses are no longer required to sacrifice usability for security. Below I’ve identified the “seven deadly sins of mobile security.
Apptimate's insight:

Protect your data with apps and in-app encryption.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

How CIOs Need to Become Enablers Rather that IT Gatekeepers When it Comes to Adopting Cloud Technologies

How CIOs Need to Become Enablers Rather that IT Gatekeepers When it Comes to Adopting Cloud Technologies | Mobility for enterprise | Scoop.it
More than two-thirds of organisations admit that unauthorised cloud applications are being implemented without IT’s knowledge or involvement.
Apptimate's insight:


There is also very often an organizational problem that set trip wires around the IT department. 
Many corporations see IT as a cost and not as business development. A cost center that is organized under the CFO and finance where it really should be seen as a business development tool, especially where business is becoming digital and global. Of course, there are costs, maintenance and operations in IT but if your CIO and IT only has an introvert and not market focus, you will never take the lead in the rapid generation shift in business going digital and cloud. 
If your board doesn't understand the shift to digital market and operations, your bottom line will be hurt. Especially if you competitors understands this. 

more...
No comment yet.