The BYOD (bring your own device) movement is going strong and shows no signs of disappearing any time soon. But for many businesses that are hesitant to adopt BYOD, it's not the idea or process of ...
IT is now challenged with implementing personal device security procedures that keeps networks safe from infection and protects data from being lost or stolen. It wasn't long ago that few would dream ...
In today’s flexible work landscape, bring-your-own-device (BYOD) policies are becoming increasingly popular, allowing employees to use personal devices for work. However, this poses some unique ...
Managed security service provider Solutionary created a BYOD timeline in its 2013 Threat Report. Failing to address BYOD is one of 5 costly security weaknesses, according to the firm's report. The ...
Some 43% of employees have been targeted with work-related phishing attacks on their personal devices, says a survey from SlashNext. Image: Adobe Stock Employees might feel more comfortable using ...
While healthcare facilities are slowly issuing mobile devices to staff and caregiver teams, it's not happening as rapidly as some would like. To that end, many healthcare professionals increasingly ...
The best insurance for cybersecurity is getting everyone involved. Technology alone won’t fix the security woes that have been rampaging through the connected business world. What is needed is the ...
There is no way around it: the modern workforce is mobile and relies on CXOs to deliver enterprise security in the clearest way possible—no matter where they find themselves. CXOs need to embrace ...
Paul Luehr knows a thing or two about security, the law and “Bring Your Own Device,” or BYOD. Formerly a federal prosecutor and supervisor of the Internet fraud program at the Federal Trade Commission ...
Businesses are ill-prepared for the attitude of next generation employees who own mobile devices, and may be placed at risk as the BYOD trend causes fractures in security enforcement.
The IRS’ bring-your-own-device program could increase the risk of data leakage, according to the Treasury Inspector General. A Treasury Department Inspector General audit released this week ...
June 25, 2018 – The Security Executive Council has been watching the data on the use of personal devices in the workplaces since 2012 when it first polled security leaders about the use and policies ...