Gartner Research Adds New Dimension to BYOD Security

Gartner’s Recent webinar presented research which puts BYOD (Bring Your Own Device) security in a completely new light. Gartner presenter, Dionisio Zumerle, began the webinar by defining BYOD from a security point of view: “The practice of deliberately breaching enterprise security by putting sensitive data on an unknown, uncontrolled, untrusted, unmanaged device.” In other words, … Continue reading Gartner Research Adds New Dimension to BYOD Security

Recent Ponemon Institute Study Casts Doubt on the Effectiveness of BYOD Policies

I recently represented InZero Systems at a webinar co-hosted by Larry Ponemon, of the Ponemon Institute, and the security firm, Avecto. The webinar was entitled, Cyber Strategies for Endpoint Defense, and was largely based on the recent report of the same name. The study points out weaknesses in security that can stem from the introduction … Continue reading Recent Ponemon Institute Study Casts Doubt on the Effectiveness of BYOD Policies

Phishing with Naked Women and Romantic Lures

“To see naked pictures of Carla Bruni click here”. Don’t feel bad if you were tempted to follow the link. At the G20 conference in Paris in 2011, almost all those attending clicked on an attachment included with the above email. “Almost everybody who received the email took the bait,” said a government source. They … Continue reading Phishing with Naked Women and Romantic Lures

[SOLVED] Help! How do I Stop Employee Internet Use from Putting Our Company Data at Risk?

Such questions are becoming more and more common as we see company after company suffering security breaches. In 2012 at the RSA Conference in San Francisco, a panel of five top security experts addressed this issue. The first question they were asked was, “can we stop data breaches, really?” The answer from all 5 panel … Continue reading [SOLVED] Help! How do I Stop Employee Internet Use from Putting Our Company Data at Risk?

BYOD and The Moth to the Flame Phenomenon

Moths don’t ask why they are attracted to flames. They simply see them as a source of light; as something irresistible. They are totally unaware of the dangers that lie beneath that attractive surface. In the end, their ignorance is their demise. The latest Cyberthreat Defense Report by The CyberEdge Group has discovered some interesting … Continue reading BYOD and The Moth to the Flame Phenomenon