ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

BYOT: Bring Your Own Token

BYOT: Bring Your Own Token | ICT Security-Sécurité PC et Internet | Scoop.it
SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization.

 

At the click of a button users can have their authentication token as an SMS on a mobile, an app on a smartphone or tablet, or a soft token on a laptop – with the ability to swap between devices at will.

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

CITE Conference to tackle BYOD issues

CITE Conference to tackle BYOD issues | ICT Security-Sécurité PC et Internet | Scoop.it

Bring-your-own-device policies are forcing companies to confront a myriad of IT challenges related to support architecture, security policies and mobile platforms. Dealing with those challenges is topic No.1

No comment yet.
Scooped by Gust MEES
Scoop.it!

Jailbreaking BYOD Control. Is Apple iOS ready for enterprise primetime?

Jailbreaking BYOD Control. Is Apple iOS ready for enterprise primetime? | ICT Security-Sécurité PC et Internet | Scoop.it
Consumerization is happening now, but many IT departments simply aren’t prepared to deal with the new challenges and complexities it entails.

 

With IT managers increasingly urged by CEOs to stop saying ‘no’ and start supporting consumer tools, they need to reappraise their traditional approach. Put simply, IT needs flexible standards – they can’t say no but neither can they say yes to everyone.

 

Cyber crime is a multi billion dollar industry, funded and resourced like legitimate business operations. The criminal gangs need to know that any investment in their own resources is going to provide a decent return, and the best way of guaranteeing that is by targeting the one large homogenous platform, just as they did with Windows in the 90s. In the mobile world, this means iOS.

 

What is clear is that Apple is not the panacea for secure, manageable consumer devices in the enterprise that many believe.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Three steps to ensuring BYOD doesnt lead to BYOT bring your own threat

Three steps to ensuring BYOD doesnt lead to BYOT bring your own threat | ICT Security-Sécurité PC et Internet | Scoop.it
As many organisations rush to adopt technologies that enable their workforce to be more mobile and satiate user demand that IT support mobile devices, security often becomes an afterthought.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Bring your own: practical advice for handling BYOD

Bring your own: practical advice for handling BYOD | ICT Security-Sécurité PC et Internet | Scoop.it
If you work in IT, you’ve probably been here already. Someone important is proudly clutching a shiny new toy and asking you that vague, difficult question: "Can I use this?". So how do you respond?
No comment yet.
Rescooped by Gust MEES from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Strong Policies A Must For BYOD | Fortinet Security Blog

Strong Policies A Must For BYOD | Fortinet Security Blog | ICT Security-Sécurité PC et Internet | Scoop.it

More and more organizations are opening up their networks with invitations that say BYOD (bring your own device) and seeing everything from iPads to the latest Android gadget walk in their doors.

 

Sounds like a win-win?

 

Well, here’s the dilemma—while everyone wants to be more efficient, surprisingly few organizations have policies in place to adequately ===> secure the influx of mobile devices being introduced into the workplace. <===

 

Read more...

No comment yet.
Scooped by Gust MEES
Scoop.it!

Four Must-Have Android Settings, From a Security Expert

Four Must-Have Android Settings, From a Security Expert | ICT Security-Sécurité PC et Internet | Scoop.it
Turn on these four settings to maximize the security of your Android smartphone.
No comment yet.