Difficult to defend against and police. By Stuart Sumner The insider threat – a member of staff who either maliciously or negligently allows sensitive corporate data to fall into criminal…
Tag: BYOD
UK Doctors Routinely Send Sensitive Patient Info by Text
Worrying figures emerge from UK health service. Phil Muncaster The perils of BYOD in the UK healthcare sector have been exposed by new research claiming that nearly two thirds of…
factoring in information security into business strategies.
Too few firms factoring in information security into business strategies. by Sara Bean: Ashley Madison and Sony are the high profile victims of cyber-hacking, but with hacks becoming more prevalent, nearly…
XcodeGhost-infected apps open gates to malware hijacking
News should worry companies without strict BYOD policies. Darren Pauli Palo Alto threat bod Claud Xiao says XcodeGhost-infected apps are open to man-in-the-middle attacks and contain a beachhead for other…
IBM tackles 'shadow IT' with a new cloud security tool for enterprises
A third of Fortune 1000 employees share and upload corporate data on third-party cloud apps, it says By Katherine Noyes If there’s one thing that can strike terror into a…
5 ways to shore up security in your BYOD strategy
The inherent risks of BYOD policies By David Weldon Youd think after all this time that organizations would have finally gotten BYOD programs pretty much down pat. Dont bet on…