RANSOMWARE TRACKING MAPS

Recent problems experienced with Ransomware are evident from infections, which have occurred in 99 countries including China and Russia. The organization that was worst hit by the attack was the National Health Service in England. It was reported that there was a WannaCry programme that demanded...

Recent Trends In BYOD Have Businesses Leaping Towards Wrong Decisions

Recent Trends In BYOD Have Businesses Leaping Towards Wrong Decisions

As I have been discussing BYOD (Bring Your Own Device) for some time now, some of you might already be familiar with it. For those who are not, BYOD as the name suggests, is about bringing your own personal devices for work use, as opposed to employing a company issued device. This usually refers to mobile devices like laptops, tablets and smart phones; I doubt anyone would bring their home desktop to work. To cut it short, BYOD is going to give some corporate IT officers headaches in the future as they are driven to make some over zealous decisions now.

Many CIO’s and IT administrators might not have realized that they have made some wrong decisions. What I am talking about is the recent surge in the number of companies quickly adapting BYOD policies because it is seen as a perk that will help appease the employee population and entice potential employees. That is not bad at all as BYOD is expected to add to employee satisfaction and productivity and is an essential component for work-shifting. The problem lies with how companies are approaching it –like a band aid solution. They are trying to implement it quickly that they are considering using cheap and lightweight device management solutions or web-based tools in order to control these devices and add a measure of security and management. This is all well and good in the beginning, but it isn’t until they try to develop or implement apps into those devices that problems start cropping up everywhere.

BYOD is merely a name and does not dictate the method of implementation. Just because, it refers to devices does not mean that we have to concentrate on the device. New devices are being released very quickly and people are replacing their devices just as fast. It will simply be a hassle to secure the device itself, it would be easier to secure and maintain the mobile app so that it will be usable in any device without really doing anything to the device itself.

Mobile device management (MDM) experts agree that the future for enterprise mobility management (EMM) lay with mobile application management (MAM). You need to secure the application, even make it cross-platform so that no matter what kind of device, it is still usable. The employee does not have to sign any confidentiality agreement involving the device, and IT does not need to wipe the device or do more than simple tweaking of settings. It should be as non-invasive as possible.

By Abdul Salam

About CloudBuzz

Daily tech news snapshots and insights from around the world...

SYNDICATED NEWS SOURCES

Hack of U.S. securities regulator rattles investors, stirs doubts

By CloudBuzz | September 21, 2017

WASHINGTON/NEW YORK (Reuters) – Wall Street’s top regulator faced questions on Thursday about its defenses against cyber criminals after admitting hackers breached its electronic database of corporate announcements and may have used it for insider trading. The incursion at the…

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

By CloudBuzz | September 21, 2017

Servers Expose Over 1 Billion Records As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making…

Thales Joins the Microsoft Enterprise Cloud Alliance

By CloudBuzz | September 21, 2017

SAN JOSE, Calif., Sept. 21, 2017 /PRNewswire/ — Thales, a leader in critical information systems, cybersecurity and data security, is now a member of the Microsoft Enterprise Cloud Alliance (ECA). Designed to foster innovation and promote awareness of partner solutions, the ECA membership…

Addressing the UK NCSC’s Cloud Security Principles

By CloudBuzz | September 20, 2017

As your organization adopts more cloud services, it’s essential to get a clear picture of how sensitive data will be protected. Many authorities, from government regulators, to industry standards bodies and consortia, have provided guidance on how to evaluate cloud…

RiskVision Named 2017 Cybersecurity Breakthrough Awards Winner

By CloudBuzz | September 20, 2017

RiskVision Named 2017 Cybersecurity Breakthrough Awards Winner for Enterprise Risk Management (ERM) Software of the Year SUNNYVALE, CA–(Marketwired – Sep 20, 2017) – RiskVision, the enterprise risk intelligence company formerly known as Agiliance, today announced that the RiskVision platform has…

Amazon working on ‘smart glasses’ as its first wearable device: FT

By CloudBuzz | September 20, 2017

(Reuters) – Amazon.com Inc is working on its first wearable device – a pair of ‘smart glasses’, the Financial Times reported on Wednesday. The device, designed like a regular pair of spectacles, will allow Amazon’s digital assistant Alexa to be…