ICT Security-Sécurité PC et Internet
87.2K views | +1 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Learning and Teaching
October 31, 2012 5:52 PM
Scoop.it!

Don’t Let BYOD become BYOV (Bring your own viruses)

Don’t Let BYOD become BYOV (Bring your own viruses) | ICT Security-Sécurité PC et Internet | Scoop.it
The return of IM worms, such as the recent Skype threat, underscores a risk that IT managers face in an increasingly BYO world.

 

It was an early form of consumerization with people bringing the applications they used in their personal lives into the workplace. Call it a “BYOA” approach: Bring Your Own Application. Always being ready to adapt to emerging trends, attackers started crafting malware that would exploit the weaknesses these new applications introduced into the workplace. Attackers adapted methods that worked so well with email worms like the ILOVEYOU worm of 2000 to create a new kind of worm that could spread even faster over IM networks.

 

============================================

 

Gust MEES

 

Check out also my curation and my FREE course about it:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=BYOD

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

============================================

 

Read more, a MUST:

http://consumerization.trendmicro.com/dont-let-byod-become-byov-bring-your-own-viruses/

 

 

Francoise Rieffel's curator insight, August 7, 2013 6:19 AM

add your insight...

 

 

 

Scooped by Gust MEES
October 15, 2012 6:03 PM
Scoop.it!

The BYOD security commandments

The BYOD security commandments | ICT Security-Sécurité PC et Internet | Scoop.it

The BYOD trend will make cyber security more complex

Of the tips put forward by IDC, the first one is perhaps the most obvious and perhaps the reasons why the BYOD trend has caused so many headaches.

 

“The consensus is that BYOD is now a given. Whether you want it or not, employees will do your work on their own devices,” says Infosec commentator Stilgherrian.

 

“So your choice is whether to have a policy that acknowledges that and lays out the ground rules, or try to ban it and end up with an infestation of unknown and uncontrolled devices.”

 

However, as many enterprises are currently finding out, controlling and securing data on multiple devices is a lot easier said than done.

 

Read more, a MUST:

http://technologyspectator.com.au/byod-security-commandments

 

No comment yet.
Scooped by Gust MEES
October 19, 2012 5:26 PM
Scoop.it!

MDM and BYOD: A square peg for a round hole

MDM and BYOD: A square peg for a round hole | ICT Security-Sécurité PC et Internet | Scoop.it
While mobile device management will always be in use in the enterprise, thankfully, a better option exists.

 

In fact, it seems the only group not excited about BYOD is IT – the ones who have to figure out how to keep sensitive corporate information safe. IT's consternation over BYOD is made worse by the fact that many think mobile device management (MDM) is the only tool available to contain the risks associated with BYOD, which is not the case.

 

MDM will always have a place in the enterprise because BYOD will simply never be the right approach for every employee. However, when it comes to BYOD implementations, MDM is not ideal. Thankfully, a better option exists. Mobile application management (MAM) presents an intriguing option for preparing for and avoiding the hazards of BYOD.

 

Read more, a MUST:

http://www.scmarketscope.com/mdm-and-byod-a-square-peg-for-a-round-hole/article/260623/

 

No comment yet.
Scooped by Gust MEES
September 27, 2012 9:26 AM
Scoop.it!

The 10 most common mobile security problems and how you can fight them

The 10 most common mobile security problems and how you can fight them | ICT Security-Sécurité PC et Internet | Scoop.it
GAO report to Congress takes a close look at mobile security issues...

 

Combine the lack of security with the fact that mobile devices are being targeted by cybercriminals and you have a bad situation. For example, the number of variants of malicious software aimed at mobile devices has reportedly risen from about 14,000 to 40,000 or about 185% in less than a year, the GAO stated.

 

Gust MEES: a MUST READ for anybody using m-Learning and "Bring Your Own Device" (Hashtag on Twitter = #BYOD)

 

Read more:

http://www.networkworld.com/news/2012/091912-mobile-security-262581.html?hpg1=bn

 

No comment yet.