Posts Tagged ‘BYOD’

Why Microsoft isn’t to blame for Home Depot’s breach: an appeal for strong authentication

0

Posted on 14th Nov 2014 by in Enterprise Security

Home Depot dealt with its data breach by switching operating system but upon closer inspection it would perhaps have been better to invest in strong authentication technology and staff training.

Three things for the CFO to consider when evaluating cyber-risk for the executive management team

0

Posted on 7th Nov 2014 by in Enterprise Security

The CFO arguably has the top job when it comes to assessing risk and making decisions on security investments. Most will have the support of the CIO in evaluating all the risks associated with technology, but have they considered all the issues that modern working practice expose the executive management team to?

Three life lessons on security from our favorite superhero movies

0

Posted on 31st Oct 2014 by in Enterprise Security

CIOs considering how their organization is exposed to different risks could gain some helpful insights from the heroes and villains in recent comic-book movie adaptions.

Self cyber-defense and security for c-level executives on the move

0

Posted on 24th Oct 2014 by in Enterprise Security

C-level executives are arguably a business’ most valuable and vulnerable asset. We’ve compiled five tips so you can encourage them to defend themselves when they’re out and about.

Giving the C-Suite the security to be free

0

Posted on 10th Oct 2014 by in Enterprise Security

C-Suite executives need the latest technology to showcase a company’s services but this puts pressure on the IT department security around CxO devices. However, a balance can be struck.

The rise of the shoulder surfer and the cyber-perils of executive travel

0

Posted on 3rd Oct 2014 by in

What are the cyber risks executives’ face when traversing the world in search of business opportunities and those all-important face to face meetings?

Launch of mobile payments for London transport system marks NFC tipping point

0

Posted on 29th Sep 2014 by in Mobile

Transport for London’s new contactless payment system marks the tipping point for wide-spread mobile payments adoption.

Securing a platform – it’s a three-way approach

0

Posted on 12th Aug 2014 by in Enterprise Security

The opening up of enterprise IT due to the effects of consumerization is resulting in ever increasing complexity of the infrastructure with a myriad of devices and applications crowded together. Gartner predicts that by 2017, half of employers will require their employees to bring their own devices to the office. This will benefit organizations and […]

Top 10 tips to achieving network security

0

Posted on 28th Apr 2014 by in Enterprise Security

This week sees the start of Infosecurity, one of the world’s biggest security conferences held in London. Is it coincidence that we recently saw the effects of a major security breach, making headlines all over mainstream news sites? Unfortunately, the truth is that security breaches don’t just happen in tandem with security conferences, but are […]

Why Even Small Businesses Need Enterprise Password Management

0

Posted on 28th Mar 2014 by in Enterprise Security

Small and mid-sized businesses (SMBs) are fortunate to avoid many of the hassles and bureaucracy that are inevitable for big enterprises. But they often lack the budget and personnel that their larger brethren can throw at business issues — especially IT-related issues. These days, however, cloud-based technologies are leveling the IT playing field, lowering costs […]