3 Recommended Whitepapers: “Keeping Secrets – Good Password Practice” Cloud security and password protection is big business. Today we have provided 3 recommended research papers to read over this week which goes alongside today’s infographic. “Enterprise Password Management – A Guide for Best Practices” Learn how using RoboForm Enterprise is an easy, secure, and practical solution to common password management challenges. An effective enterprise password management approach increases security without decreasing productivity or increasing costs. It’s essential to create a solution that your employees will actually follow and use. RoboForm Enterprise is a unique solution that allows your organization to
Let’s Talk Workspace Cloud Security! Let’s face it, security most likely tops the list for IT challenges and now with cloud technology’s significant expansion over the years and the increase of personal devices, also known as BYOD, being used in and outside the workplace, the challenges have gotten that much more intense. As per BT.com’s infograph nearly half the concerns about BYOD security includes giving out unauthorized security information, using an unsecure device, and even theft of devices. (Image Source: Shutterstock) BYOD’s are the biggest concern; however, a company’s most fragile security spot begins with its employees. More specifically, human
Signing on the Dotted Cloud One area where the virtual world of the cloud leads to a sense of discomfort has to do with signing documents and contracts. For centuries, the binding value of an agreement was based on an individuals capacity to sign his or her name at the bottom a visual and permanent testament to a persons consent to the terms of the agreement. Prior to the age of the fax machine, these documents were signed and then transported by courier or mail, but this changed once it became possible to enforce contracts based on a documents
Making Bring Your Own Device (BYOD) and eDiscovery Work for your Business The latest challenges to your business’ eDiscovery policies and procedures may not be changes in the law but may instead be changes in your employees’ lifestyles: they have smartphones and they want to use smartphones to facilitate their work. A 2011 study by IDC and Unisys showed that approximately 50 percent of respondents reported using personal devices to conduct business on vacation. This is great news for businesses and shows the advantages of allowing BYOD. Unfortunately, the same survey also indicated that 29 percent of respondents used the
Report Traces Cloud Computing Security Errors in India, other Countries to Errant Humans While India has attracted a number of big giants in the Information Technology and cloud computing niches, it still ranks as one of the top guns that suffer security compromises. A report that came out early June, with a focus on the 2012 cloud environment around the globe, and particularly the subcontinent, showed a trend of rising cost-per-safety-compromise that is likely to hike where humans botch up their digital work. The report finds crossroads between the three-quarters of data the Indian subcontinent lost over the past year
Invisible Computing: How Cloud Is Forcing Software And Hardware Apart By 2018, Gartner predicts that 70 per cent of professionals will conduct their work on personal mobile devices, enabled by the revolutionary concept of cloud computing. Cloud computing essentially separates software from the logical functionality of local hardware. In other words, instead of needing computing power to be housed locally, major computing functions will instead be accessible from afar, usually via the Internet. The obvious benefit here is that risk of ownership of software is eliminated, as well as the need to hire in-house resources to service them. What will
BYOD And The Issues Surrounding Cloud Storage As BYOD increases and employees increasingly use personal laptops, smartphones and mobile devices for work purposes, concerns over data security and data privacy remain the most significant barriers to cloud adoption, according to the latest research from the Cloud Industry Forum (CIF). Corporate IT managers and CIOs are rightfully correct in their trepidation as they open their networks to and data leakage plus lose control over data once it leaves the corporate confines. While employees benefit from the ability to work from anywhere by using the cloud services that provide BYOD support, they
Cloud Infographic: BYOD Security and Policies AccelOps Cloud Security Survey Report surveyed some 176 IT security personnel and they ranked BYOD as the top source for fear of incurring data loss and having the need for heightened data control. This is the traditional topic or cloud worriers and opponents of cloud computing which only helps in propagating the myth that cloud computing in not secure. ISC2’s January research shows that explicitly linked cloud computing to the creation of personal device policies. But the take away from the research is that companies who support BYOD have happier employees while also needing to increase their cloud security knowledge and skills.