ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Android botnets on the rise - case study

Android botnets on the rise - case study | ICT Security-Sécurité PC et Internet | Scoop.it
Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and in general of mobile cyber threats.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnets

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Customized spam uses cell phone users’ data against them

Customized spam uses cell phone users’ data against them | ICT Security-Sécurité PC et Internet | Scoop.it

US mobile spammers are using cell phone users’ personal data to launch invasive, highly targeted attacks, according to AdaptiveMobile.

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.

 

Gust MEES's insight:

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.

 

A MUST read!!!

 

Gust MEES's curator insight, June 19, 2013 12:03 PM

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.


A MUST read!!!

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security | ICT Security-Sécurité PC et Internet | Scoop.it

Why (And How) Teachers Should Start Learning and Teaching Cyber-Security . What should get be taught and learned more in the 21st Century while using ICT?

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

  

Gust MEES's insight:

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

 

===============================================

 

There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.

 

What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

  

Zhao KQiang's curator insight, March 27, 2014 7:23 AM

give some opinions of that why teachers and education should learn network secutity

Dean J. Fusto's curator insight, July 31, 2015 10:12 AM

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

 

===============================================

 

There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.

 

What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

  

Jean-Pierre Blanger's curator insight, August 1, 2015 4:19 PM

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

 

===============================================

 

There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.

 

What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

  

Scooped by Gust MEES
Scoop.it!

Flaws in Samsung Phones Allow Hackers to Make Calls, Install Apps and Change Settings [Video]

Flaws in Samsung Phones Allow Hackers to Make Calls, Install Apps and Change Settings [Video] | ICT Security-Sécurité PC et Internet | Scoop.it
Flaws in Samsung Phones Allow Hackers to Make Calls, Install Apps and Change Settings

 

Two of the vulnerabilities can be leveraged to silently install highly privileged apps without requiring any user interaction. A different issue can be exploited by an attacker to send SMS messages without requiring the android.permission.SEND_SMS permission. 

Another vulnerability can be used to silently make phone calls, send emails and SMSs, and perform “almost any action.”


Gust MEES's insight:

 

Two of the vulnerabilities can be leveraged to silently install highly privileged apps without requiring any user interaction. A different issue can be exploited by an attacker to send SMS messages without requiring the android.permission.SEND_SMS permission. 

Another vulnerability can be used to silently make phone calls, send emails and SMSs, and perform “almost any action.”


No comment yet.
Scooped by Gust MEES
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | ICT Security-Sécurité PC et Internet | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Symbian malware scene far from dead

Symbian malware scene far from dead | ICT Security-Sécurité PC et Internet | Scoop.it
Despite Android’s dominance in the mobile threat landscape, the Symbian malware scene is far from dead. 21 new families and variants were discovered in the third quarter of 2012, a 17% increase compared to the second quarter.

 

Read more, a MUST:

http://www.net-security.org/malware_news.php?id=2314

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Les smartphones Android touchés par une faille USSD

Les smartphones Android touchés par une faille USSD | ICT Security-Sécurité PC et Internet | Scoop.it
Une faille de sécurité permet à un simple code reçu par SMS de réinitialiser automatiquement et d’effacer toutes les données de certains smartphones fonctionnant sous Android.

 

 

 

 

 

 

Visualisez aussi la vidéo ici : http://www.youtube.com/watch?v=Q2-0B04HPhs&amp;amp;feature=player_embedded

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Sophos rolls out mobile apps for anti-malware and encryption

Sophos rolls out mobile apps for anti-malware and encryption | ICT Security-Sécurité PC et Internet | Scoop.it
Antivirus app for Android expected to be integrated into Sophos mobile-device management...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile malware has become a profitable industry

Mobile malware has become a profitable industry | ICT Security-Sécurité PC et Internet | Scoop.it

Mobile malware has now become a profitable industry. Because of its global ubiquity as a phone payment mechanism, premium text billing is the most common tactic used by malware writers to commit financial fraud on mobile.

 

This class of malware, termed “Toll Fraud,” has become the most prevalent type of malware within the past year. Just one family of Toll Fraud malware, FakeInst, accounted for 82 percent of Lookout user detections in June 2012 and is estimated to have successfully stolen millions of dollars from people in Russia, the Middle East, and parts of Europe.

 

Read more:

http://www.net-security.org/malware_news.php?id=2260&amp;utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

McAfee: Malware at highest level for four years

McAfee: Malware at highest level for four years | ICT Security-Sécurité PC et Internet | Scoop.it
Malware attacks are at the highest level for four years according to a McAfee report, with a malicious code writers finding new ways to attack mobile devices.

 

 

 

Read more:

http://news.techeye.net/security/mcafee-malware-at-highest-level-for-four-years#utm_source=thetecheye&utm_medium=twitter&utm_campaign=default

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

FinFisher trojan for iOS and Android sighted

FinFisher trojan for iOS and Android sighted | ICT Security-Sécurité PC et Internet | Scoop.it
Mobile variants of the commercial FinFisher trojan target BlackBerry, Windows Mobile, Symbian, Android and iOS devices.

 

The commercial FinFisher FinSpy spyware trojan was created by Gamma International, and its development is believed to take place in Germany. The company sells its trojan toolkit – which is thought to currently support all major operating systems including Linux, Mac OS X and Windows – to governments for use by security agencies. Until now, relatively little was known about the mobile variant of the trojan.


Based on the available code samples, Citizen Lab is convinced that the mobile trojans it analysed are a mobile variant of FinSpy. The trojan is believed to be capable of monitoring rooms through silent calls, downloading files, tracking a user's location, and forwarding phone calls, SMS text messages and emails. FinSpy can also apparently intercept BlackBerry Messenger messages. The trojan typically infects smartphones via specially crafted emails.


The iOS variant requires iOS 4 or later and is executable on all iPad models, on iPhone 4 and 4S devices, and on third and fourth generation iPod Touch devices. The app installs in the background, downloads further code, and injects this code into the startup routine, anchoring itself deep into the system. The researchers found "FinSpyV2" references in the binary. As the binary contains a valid developer certificate and an ad-hoc distribution profile, iOS devices accept it without the need for a jailbreak. The certificate was issued to Martin Münch – the managing director of Gamma International's German subsidiary.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Trojaner aus Deutschland verbreitet sich auf iOS und Android

Trojaner aus Deutschland verbreitet sich auf iOS und Android | ICT Security-Sécurité PC et Internet | Scoop.it
Wenn auf Ihrem Smartphone FinSpy Mobile läuft, können Ihre Telefonate, SMS und Mails mitgeschnitten werden. Außerdem sind Sie stillen Anrufen ausgesetzt: Der Hacker hört heimlich alles mit.

 

 

 

 

Mehr lesen und schlauer werden:

 

http://www.pcwelt.de/news/FinSpy-Trojaner-aus-Deutschland-auf-iOS-und-Android-6527811.html?r=661529324905623&amp;amp;lid=193492

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Researchers Identify Four BlackBerry Zitmo Variants

Researchers Identify Four BlackBerry Zitmo Variants | ICT Security-Sécurité PC et Internet | Scoop.it
Security researcher Denis Maslennikov identified a new Zitmo variant for Android using the same command and control (C&C) numbers as the BlackBerry versions. The samples were three .cod files and one .jar file with a .cod file inside.

 

Security researchers have identified new Zeus samples targeting Android and BlackBerry devices.

 

Despite its significant user base within enterprises, BlackBerry devices have managed to stay off the radar for malware writers. That may be ending, as Kaspersky Lab recently analyzed four new Zeus-in-the-mobile (Zitmo) samples targeting BlackBerry users in Germany, Spain, and Italy, Denis Maslennikov, a researcher at Kaspersky Lab wrote on the company's Securelist blog. These variants were communicating with two command-and-control cell phone numbers associated with a Swedish mobile operator.

 

Read more:

http://www.securityweek.com/researchers-identify-four-blackberry-zitmo-variants

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

FakeAV on an Android Device

As with computer malware, the FakeAV app on Android devices coaxes users into purchasing full version software in order to remove infections. Pop-ups will ap...
Gust MEES's insight:

 

Check it out and beware of the malware!!!


Gust MEES's curator insight, June 26, 2013 7:10 AM

 

Check it out and beware of the malware!!!

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

#BYOD: Mobile malware growth hits all-time high

#BYOD: Mobile malware growth hits all-time high | ICT Security-Sécurité PC et Internet | Scoop.it
Researchers continue to find that the pace of mobile malware development is accelerating.

 

Researchers continue to find that the pace of mobile malware development is accelerating.A total of 22,750 new modifications of malicious programs targeting mobile devices were detected this past quarter by Kaspersky Lab, which is more than half of the total number of modifications detected in all of 2012.A full 99.9% of them target the Android platform.

 

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Scooped by Gust MEES
Scoop.it!

First targeted attack to use Android malware discovered

First targeted attack to use Android malware discovered | ICT Security-Sécurité PC et Internet | Scoop.it
Kaspersky uncovers trojan spread by "spear-phish" to Tibet activists.

 

Malware used to spy on Tibetan activists and other ethnic groups in China is nothing new. But a new Trojan discovered by researchers at Kaspersky Labs has widened the scope of this digital espionage and intimidation. The malware uses a combination of e-mail hacking, "spear phishing," and a Trojan built specifically for Android smartphones.


===> Kaspersky claims this is the first discovery of a targeted attack that uses mobile phone malware. <===

Gust MEES's insight:

 

Malware used to spy on Tibetan activists and other ethnic groups in China is nothing new. But a new Trojan discovered by researchers at Kaspersky Labs has widened the scope of this digital espionage and intimidation. The malware uses a combination of e-mail hacking, "spear phishing," and a Trojan built specifically for Android smartphones.

 

===> Kaspersky claims this is the first discovery of a targeted attack that uses mobile phone malware. <===

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Managing Mobile Privacy | Security Intelligence Blog [Infographic]

Managing Mobile Privacy | Security Intelligence Blog [Infographic] | ICT Security-Sécurité PC et Internet | Scoop.it
Trend Micro infographic on how users can manage their privacy while using their mobile devices.
Gust MEES's insight:

A MUST have Infographic to understand the risks!!!
SHOULD be pinned in any schools!


Gust MEES's curator insight, February 4, 2013 8:13 AM

A MUST have Infographic to understand the risks!!!

SHOULD be pinned in any schools!

 

Nqobile Martha's curator insight, May 29, 2014 9:05 AM
PRIVACY AND ICT The whys and wherefores of privacy

Privacy is a sensitive subject to which people attach great importance. The only problem is that they do not know exactly why. Still, if it is so important then it is also necessary to establish why that is the case. It is therefore the task of ethicists to clarify the relevant theoretical arguments and practical implications.

Any topics that touch on privacy, such as the electronic files on patients (efp) and cameras in public spaces therefore soon become topics of heated social and political debate. People appreciate the advantages of new information technology but are at the same time alarmed to realize that so much is known about them. It is often emotions that play a decisive role because the relevant arguments are difficult to formulate not to mention weigh up.

Nqobile Martha's curator insight, May 29, 2014 9:08 AM
PRIVACY AND ICT The whys and wherefores of privacy

Privacy is a sensitive subject to which people attach great importance. The only problem is that they do not know exactly why. Still, if it is so important then it is also necessary to establish why that is the case. It is therefore the task of ethicists to clarify the relevant theoretical arguments and practical implications.

Any topics that touch on privacy, such as the electronic files on patients (efp) and cameras in public spaces therefore soon become topics of heated social and political debate. People appreciate the advantages of new information technology but are at the same time alarmed to realize that so much is known about them. It is often emotions that play a decisive role because the relevant arguments are difficult to formulate not to mention weigh up.

Scooped by Gust MEES
Scoop.it!

Facebook shows its support for joint EU-US online safety declaration

Facebook shows its support for joint EU-US online safety declaration | ICT Security-Sécurité PC et Internet | Scoop.it
Sheryl Sandberg confirms Facebook's commitment to keeping people safe online with support for the joint declaration today between the European Commission and US Department of Homeland Security.

 

=============================================

 

Gust MEES

 

Check out ALSO 

 

My curation about "World efforts for a more secure Internet":

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Worldwide+efforts+4+more+secure+Internet

 

=============================================

 

Read more:

http://www.zdnet.com/facebook-shows-its-support-for-joint-eu-us-online-safety-declaration-7000007664/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

F-Secure: Mobile Threat Report Q3-202012 [pdf]

THIS REPORT DISCUSSES THE MOBILE THREAT LANDSCAPE AS SEEN IN THE THIRD QUARTER OF 2012, AND INCLUDES STATISTICS AND DETAILS OF THE MOBILE THREATS THAT F-SECURE RESPONSE LABS HAVE SEEN AND ANALYZED DURING THAT PERIOD. THE DATA PRESENTED IN THIS REPORT WAS LAST UPDATED ON 30 SEPTEMBER 2012.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The 10 most common mobile security problems and how you can fight them

The 10 most common mobile security problems and how you can fight them | ICT Security-Sécurité PC et Internet | Scoop.it
GAO report to Congress takes a close look at mobile security issues...

 

Combine the lack of security with the fact that mobile devices are being targeted by cybercriminals and you have a bad situation. For example, the number of variants of malicious software aimed at mobile devices has reportedly risen from about 14,000 to 40,000 or about 185% in less than a year, the GAO stated.

 

Gust MEES: a MUST READ for anybody using m-Learning and "Bring Your Own Device" (Hashtag on Twitter = #BYOD)

 

Read more:

http://www.networkworld.com/news/2012/091912-mobile-security-262581.html?hpg1=bn

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Zero-Day Exploit Found on Samsung Galaxy S3

Zero-Day Exploit Found on Samsung Galaxy S3 | ICT Security-Sécurité PC et Internet | Scoop.it
A team of Android security experts successfully hacked a Samsung Galaxy S3 by revealing two Android exploits at the Mobile Pwn2Own competition at EUSecWest in Amsterdam.

 

 

 

Read more:

http://www.hotforsecurity.com/blog/zero-day-exploit-found-on-samsung-galaxy-s3-3591.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Schadsoftware verursachte 10 Millionen Dollar Schaden

Mobile Schadsoftware verursachte 10 Millionen Dollar Schaden | ICT Security-Sécurité PC et Internet | Scoop.it
Lookout, ein Hersteller für Sicherheits-Tools für mobile Geräte, hat in einer aufwändigen Studie herausgefunden, dass alleine durch eine Schädlingsfamilie rund 10 Millionen Dollar Schaden entstanden ist.

 

Mehr erfahren:

http://www.pcwelt.de/news/Studie-Mobile-Schadsoftware-verursachte-10-Millionen-Dollar-Schaden-6553565.html?r=261529428405648&amp;lid=194844

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Spyware Takes Over iPhones, Androids

Spyware Takes Over iPhones, Androids | ICT Security-Sécurité PC et Internet | Scoop.it
DFI News Digital Forensic Investigator is a multi-media resource for digital forensic professionals working in academic, government, law enforcement, and corporate settings.

 

Call it Invasion of the iPhone Snatchers: a new FinFisher-based spyware is built to infect iPhones and iPads (and Android, BlackBerry and Windows Phone gadgets too) in order to take over the device completely — all unbeknownst to the user.

 

The smartphones and tablets will innocently appear to be themselves, but in reality the mobile malware is working in the background to track the device’s location, monitor activity and intercept communications including emails, voice calls and text messages.

 

Read more:

http://www.dfinews.com/news/spyware-takes-over-iphones-androids?et_cid=2825646&amp;et_rid=454853272&amp;linkid=http%3A%2F%2Fwww.dfinews.com%2Fnews%2Fspyware-takes-over-iphones-androids#.UEDceehnFCE.twitter

 

Scooped by Gust MEES
Scoop.it!

What Apple and Google are not Telling you About Mobile Device Security (infographic) - Forbes

What Apple and Google are not Telling you About Mobile Device Security (infographic) - Forbes | ICT Security-Sécurité PC et Internet | Scoop.it

Article from FORBES 5/23/2012 @ 10:50AM |36,211 views

 

With 6 billion global mobile subscribers and over 35 billion apps downloaded to those devices, one begins to wonder how secure this situation is for businesses. In fact it’s not.

 

The situation can best be described as turning an organization’s network security into Swiss cheese, where holes are opening up from devices everywhere.

Welcome to the mobile business revolution. Along with any major insurgency, what previously seemed secure meets what suddenly makes it vulnerable.

=============================================

 

Gust MEES: Thanks to Kevin Corbett for this Tip and once again I should say; NOBODY IS PERFECT and a secure Internet can ONLY be there when ALL of us are helping to make it secure by protecting our "BYOD" devices!

 

Check out also my FREE courses about basic IT-Security here (easy to follow and to understand)  by 5 minutes tutorials:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Read more:

http://www.forbes.com/sites/markfidelman/2012/05/23/what-apple-and-google-are-not-telling-you-about-mobile-device-security-infographic/

 

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Nearly half of firms supporting BYOD report data breaches

Nearly half of firms supporting BYOD report data breaches | ICT Security-Sécurité PC et Internet | Scoop.it
Nearly half of enterprises that allow employee-owned devices to connect to a company’s network have experienced a data breach, a study has revealed.

 

Most of these companies reacted by restricting data access rights (45%) or installing security software (43%), according to the survey of 400 IT professionals by Decisive Analytics.

 

Read more, a MUST:

http://www.computerweekly.com/news/2240161202/Nearly-half-of-firms-supporting-BYOD-report-data-breaches?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.