Social Network for Web Professionals

Webmaster Blog

Members blog at WebmaisterPro. Covering topics related to online marketing, SEO, web development as well as software reviews.

Endpoint Devices with the Highest Security Risk and Why It's So Hard to Manage Them

One of the prevailing fears of businesses all over the world is the potential for cyber attacks to hit their networks and steal valuable company data or damage infrastructure. There’s good reason for these fears. The number of attacks against companies have increased this year, and security risks are bigger than ever before. A recent survey from the Ponemon Institute shows that the explosion of personal mobile devices in the workplace, along with expansions in cloud computing, have increased the number of security risks. If that weren’t disconcerting enough, the same survey showed IT departments were having a much more difficult time managing these new technologies and risks. As companies prepare to head into the future, they’ll need to come up with the right strategies for dealing with these new threats and shoring up endpoint security. (Tweet This: A recent survey shows more mobile devices in the workplace has led to increased security risks. #security #byod) Security risks have always been a problem for companies, but only recently has it grown dramatically. The same survey from the Ponemon Institute compares the recent numbers with the previous year, and nearly every category has seen an increase. Endpoint devices are the primary concern,...
Rate this blog entry:
0
Continue reading
10354 Hits
0 Comments

The Realities of Employee Compliance with BYOD Rules

Bring your own device (BYOD) has been growing in popularity in recent years. In the workplace, BYOD essentially allows employees to use personal devices for company purposes. This practice has become so widespread that some even predict it will become mandatory by approximately half of employers by the year 2017. This is especially true for midsize and larger enterprises (2,500-5,000 employees) where the practice is more prevalent. While many point to the benefits of such a system, which include greater employee freedom and potential reduces cost to the company, others emphasize the risks, mainly in the realm of security. Much of the success of a BYOD system lies in the hands of the employees themselves. If employees are careful and diligent in following rules that minimize risk, security becomes less of a problem. However, there is evidence to suggest that many employees may not be willing to comply. Young people don’t follow the rules Recent research shows that the younger generation of employees (age 21 to 32), including those who are now just entering the workforce, are resistant to BYOD security policies. Researchers took a survey of 3,200 employees at this age and found that 51 percent were willing to ignore...
Rate this blog entry:
0
Continue reading
2145 Hits
0 Comments