RANSOMWARE TRACKING MAPS

Recent problems experienced with Ransomware are evident from infections, which have occurred in 99 countries including China and Russia. The organization that was worst hit by the attack was the National Health Service in England. It was reported that there was a WannaCry programme that demanded...

How BYOD Affects Security In The Cloud

How BYOD Affects Security In The Cloud

Since bringing your own device – also known as BYOD – is starting to become widely adopted by companies of all sizes, a lot of contradictory discussions have appeared around this topic. Eliminating hardware purchasing and maintenance is a great advantage for reducing company costs. Employees also benefit from this new trend the most because they are free to choose what device to use to fit their personal and business needs.

However, the main challenge with BYOD is securing a wide variety of devices. Therefore, enterprises have turned to SaaS, solutions because they can make data more secure and reducing the likelihood of user error. Google Apps allows users to use documents or emails, but none of this data is stored on the hardware device, so risks to physical data loss decrease significantly.

Another important aspect to consider is user error. Taking into account that 63% of users losing data is attributed to user error. If the employee has the chance to use the device they feel more comfortable and familiar with, it would most likely lead to less mistakes.

To make sure that cloud computing and BYOD successfully co-exist in enterprises, support processes have been defined by many organizations. These help employees to work from a mobile device within the corporate network securely.

Here are the main topics you should consider so BYOD will not affect security in the cloud:

– create rules for accessing corporate applications
– address use policies that are acknowledged by all employees
– develop policies that apply in the situation when a employee changes its job and the company needs to have access to the data
– implement tools to identify and reduce breaches from being introduced into the organization

Employees appreciate the chance to choose the device they’ll work from. This gives them more freedom, more control and their motivation will increase considerably, which is an added benefit for the company. Before adopting BYOD policies within your company, make sure you understand both the benefits and the shortcomings of this trend and take the most appropriate decisions according to your business needs.

By Rick Blaisdell / RicksCloud

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as technology related infographics and comics.

SYNDICATED NEWS SOURCES

Hack of U.S. securities regulator rattles investors, stirs doubts

By CloudBuzz | September 21, 2017

WASHINGTON/NEW YORK (Reuters) – Wall Street’s top regulator faced questions on Thursday about its defenses against cyber criminals after admitting hackers breached its electronic database of corporate announcements and may have used it for insider trading. The incursion at the…

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

By CloudBuzz | September 21, 2017

Servers Expose Over 1 Billion Records As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making…

Thales Joins the Microsoft Enterprise Cloud Alliance

By CloudBuzz | September 21, 2017

SAN JOSE, Calif., Sept. 21, 2017 /PRNewswire/ — Thales, a leader in critical information systems, cybersecurity and data security, is now a member of the Microsoft Enterprise Cloud Alliance (ECA). Designed to foster innovation and promote awareness of partner solutions, the ECA membership…

Addressing the UK NCSC’s Cloud Security Principles

By CloudBuzz | September 20, 2017

As your organization adopts more cloud services, it’s essential to get a clear picture of how sensitive data will be protected. Many authorities, from government regulators, to industry standards bodies and consortia, have provided guidance on how to evaluate cloud…

RiskVision Named 2017 Cybersecurity Breakthrough Awards Winner

By CloudBuzz | September 20, 2017

RiskVision Named 2017 Cybersecurity Breakthrough Awards Winner for Enterprise Risk Management (ERM) Software of the Year SUNNYVALE, CA–(Marketwired – Sep 20, 2017) – RiskVision, the enterprise risk intelligence company formerly known as Agiliance, today announced that the RiskVision platform has…

Amazon working on ‘smart glasses’ as its first wearable device: FT

By CloudBuzz | September 20, 2017

(Reuters) – Amazon.com Inc is working on its first wearable device – a pair of ‘smart glasses’, the Financial Times reported on Wednesday. The device, designed like a regular pair of spectacles, will allow Amazon’s digital assistant Alexa to be…