BYOD is a growing sensation in the business world, but the trend often leaves security as an afterthought. Three BYOD experts share their advice and experience on how mobile workers, home offices and BYOD can improve business while still managing data security.
Free mobile applications often come with unusual permissions that can put users' data at risk, such as outgoing calling, camera access and SMS capabilities.
Thirty-one percent of data breaches are caused by simple loss or theft, a new Forrester study reports, and another 27 percent of incidents are caused by unwitting misuse of data by an employee.
The number of tablet owners continues to soar, making it difficult for manufacturers to keep up with demand. New tablet owners are increasingly business users, particularly within industries such as retail, banking, and healthcare. Estimates indicate that 25 percent of tablet sales in 2011 will be made by enterprises, leading some to call 2011 the year of the enterprise tablet. All estimations aside, a tablet’s ability to provide mobility and flexibility is irrefutable, and businesses are noticing. But can tablets be deployed in an enterprise without sacrificing security?
Ideal for military, air-constrained and mobile applications that experience harsh environments with extreme dust, vibration and heat, the Pivot3 HardBank™ video storage handles up to 70 cameras and VMS applications from more than 30 open systems partners.
IT security staff at small and midsize businesses (SMBs) spend 127 hours every month managing their on-premises security infrastructure, according to a new survey by Webroot.