Posts Tagged ‘Network Security’

2012 has been quite the year for the mobile security industry. We’ve seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network security. We’ve seen multiple strands of different trojans and malware that cost companies hundreds of thousands of dollars. Microsoft released Windows 8, thus sparking the debate over exclusively relying on DirectAccess in lieu of virtual private networks (VPNs). As a result of these major trends, we’re beginning to see industry-wide recognition that simple password protection is no longer sufficient. Rather, such techniques as split tunneling, two-factor authentication, and encryption offer safer ways to access corporate networks remotely. So we want to know, given the growing spotlight on threats to remote access, what solutions do you think should lead the charge for enhanced network security in the coming year? As always, feel free to elaborate in the comments.

Dark ReadingHalf Of Machines Shopping On Cyber Monday Likely Contain Vulnerabilities
Midsize Insider  – IT Security Threats: The Predictive Problem 
SearchCloudApplications Mobile cloud trends: Apps let enterprises handle the risks of cloud computing
TabTimes  Study: Forget corporate deployments, BYOD will drive business adoption of Windows 8 tablets

Today, we join Joe the CIO as he ponders technology investment costs. In particular, Joe can’t help but wonder if there are some expenses related to a recent remote access project that he overlooked — or worse, ignored. This predicament might sound familiar to anyone who oversees technology purchasing. In fact, many don’t realize the majority of accrued expenses pertain to operations and personnel, not hardware and software investments. In Joe’s case, realizing this helped him optimize and ensure the efficiency of his remote access technology, with help from NCP engineering. Want to learn how? Check out this video.

This week, we rejoined Joe the (paper) CIO on his quest to find the most thorough, cost-efficient way to secure his company’s corporate network. Now, we’d like to know more about your experience doing the same. Is your company doing enough to keep its information safe? Let us know how you feel in today’s poll – and  as always, please feel free to elaborate in the comments section. Also, stay tuned next week for more Joe!

InfoWorldApple Devices Only? That’s not BYOD
Dark Reading10 Tips For Protecting Mobile Users
LifeHacker – How Secure Are You Online: The Checklist
SearchSecurityMobile security survey 2012 audio slideshow