Tag Archives: BYOD

Three Security Concerns for 2016

As we near the end of 2015, what will 2016 look like in the information security sector? Undoubtedly there be an increase in data breaches across all industries, but will businesses take the high road and inform their customers and … Continue reading

Posted in Business Process, BYOD, corporate data, Data Breach, data protection, Data Security, Internet of Things, Mobile Malware | Tagged , , , , | Leave a comment

Does Your Business Have a Cloud Computing Usage Policy?

Many businesses have a Bring Your Own Device (BYOD) to Work policy, a risk management policy, and some businesses are even tech-savvy enough to have a social media policy. Some businesses go one step further and introduce and review all … Continue reading

Posted in Business Process, BYOD, Cloud Computing, Cybersecurity, Data Breach, data protection, Data Security, Management and Technology, Network Security, Telecommuting | Tagged , , , | Leave a comment

Don’t Forget Security When Developing Corporate Mobile Apps – Time for Another Look

About a year ago, I wrote a post about the importance of security when developing mobile device apps. As part of the post, I also discussed the importance of security when evaluating the “bring your own device” to work (BYOD) … Continue reading

Posted in BYOD, Data Breach, Data Security, Internet of Things, MSP, Privacy Rights | Tagged , , , , | Leave a comment

A Cheat Sheet to Translate InfoSecurity for Key Business Units

As a result of working with many different business units over the last decade, I’ve developed my ability to help companies by bridging the business and technology gap – and align technology strategies with business objectives. Toward that end, I … Continue reading

Posted in BYOD, Data Breach, Data Security, Management and Technology, Network Security, Tech Equipment | Tagged , , , | Leave a comment

Don’t Forget Security When Developing Corporate Mobile Apps

With the rise in mobile device usage, bring your own devices to work (BYOD), the Internet of Things (IoT), combined with the decline of personal computers, many corporate leaders believe that their businesses should develop a mobile application, or in … Continue reading

Posted in BYOD, Cybersecurity, Internet of Things, Mobile Computing, Online Security | Tagged , , , | 2 Comments

5 Ways to Prepare for Data Breaches – Before It’s Too Late

I read a recent post that has stuck with me. The question raised was how do businesses, especially midsize businesses, budget for insider threats: “Midsize firms simply cannot afford data breaches, no matter what the cause. [But] a company that … Continue reading

Posted in Business Process, BYOD, Data Security, Disaster Recovery, Management and Technology, Network Security, Social Media | Tagged , , , | 1 Comment

The Newest Event at the Olympics: Electronics Hacking

If you own a business, you should be very worried for the next couple of weeks. You may not be making any large purchases, hiring entire departments of personnel, or launching new products, but your data may be at risk … Continue reading

Posted in Business Process, BYOD, Cybersecurity, Data Security, Management and Technology, Network Security, Online Privacy, Online Security, Tech Equipment | Tagged , , | Leave a comment

How Secure Are Your BYOD Devices in the Workplace?

By now, everyone in the business world knows what the four initials BYOD mean. But if not, it stands for Bring Your Own Device to work. This means that, for a variety of reasons, employees bring their smartphones and tablets … Continue reading

Posted in Business Process, BYOD, Data Security, Management and Technology, Mobile Computing, Network Security, Online Security, Tech Equipment | Tagged , | 2 Comments