The number of companies investing in mobile management and security solutions related to bring your own device (BYOD) programs is growing, but not nearly as fast as the number of companies that are actually offering BYOD to their employees. The result is that many companies are putting themselves and their data at risk by jumping onto the BYOD bandwagon too quickly and without properly securing employee iPhones, iPads, and other devices or the business data that is stored on them.
Mountain Lion Offers Dozens Of New Features For Business Users
Mountain Lion includes over 200 new features. Some of them are dramatic and hard to miss while others are minor conveniences that don’t stand out immediately. Many of those big and small new features and improvements have a lot of appeal for business users.
Here’s a list of the many new features in Mountain Lion that can help professionals in almost any industry work smarter, more efficiently, and more effectively.
These Mac Utilities And Enterprise Tools Are Ready To Roll With Mountain Lion
Many Mountain Lion apps will function normally under Mountain Lion, but many won’t. Of particuar concern are the various utilities that help keep Mac systems secure, scan for viruses and malware, integrate with enterprise systems in businesses and schools, and dianose and repair problems.
These tools often require much deeper integration with OS X than other apps. That means that developers need to ensure they function as intended and don’t damage any documents, files, OS X system components, or other apps. That can sometimes delay releases of key utilities.
Here’s a list of Mac utilities and enterprise tools that have confirmed Mountain Lion Compatibility
iOS 6 Fix For In-App Purchasing Exploit Cannot Be Bypassed
Apple’s fight against Russian hacker Alex Borodin, who took advantage of an in-app purchasing exploit to provide users with paid content for free, has paid off. The Cupertino company has developed a fix that will make its debut in iOS 6, which is almost impossible to bypass, according to Borodin.
Apple’s iCloud and Gatekeeper Make Businesses Choose One Security Risk Over Another
In putting together the various features of Mountain Lion, Apple may end up encouraging business and enterprise customers to actually make their Macs less secure instead of ratcheting up security as some key Mountain Lion capabilities are intended to do.
There are a handful of technologies involved, but they center around iCloud and Apple’s requirement that apps sold in the Mac App Store support Apple’s application sandboxing technique.
19% Of iOS Apps Access Your Address Book Without Your Permission… Until iOS 6 [Report]
Antivirus software specialist Bitdefender has found that nearly 19% of iOS apps access your address book without your knowledge — or your consent — when you’re using them, and 41% track your location. What’s most concerning is over 40% of them don’t encrypt your data once it has been collected.
That’s all going to change when iOS 6 makes its debut later this year, however.
TigerText With Dropbox Offers Secure Multiplatform Messaging And File Sharing
Email and messaging continue to be core business requirements for mobile professionals. Business messaging can also present a mobile security challenges. Ensuring communications sent over a carrier network or Wi-Fi are secure and only read by intended recipients is sensible for any company. In certain industries, secure messaging is required by law or regulation.
There are a range of ways to ensure secure messaging. One of which is TigerText, a multi-platform solution for secure messaging that meets industry-specific security and privacy require like HIPAA in the healthcare industry or SOX compliance in business/finance. TigerText offers more than just secure texting, however. The platform also includes group messaging and the ability to recall messages after they’ve been sent.
As of today, it also include Dropbox integration. That allows users to not only exchange messages securely, but also to share files securely with some attractive business and security features.
Safely Move Keychain Files From Your Old Mac To A New One [OS X Tips]
Copying files to a new Mac? Perhaps one of them newfangled MacBook Pros? While most of us use Migration Assistant to move our files from one Mac to a new one, it may not be an option in your particular case. I’ve definitely wanted to move just the bare minimum of files over to a new Mac before, and today’s tip should help with just that.
The Keychain is a place to store passwords and login information, and it’s fairly easy to move your Mac’s Keychain to a new one. Here’s how.
Bitzer Mobile Makes Secures Data On Business iOS Devices Easier To Access
One of the things that can frustrate mobile users when using an iPhone or iPad for work is needing to repeatedly enter passcodes other user account credentials like a user name and password. Often because of a mobile device’s size and virtual keyboard, this process can seem more onerous than it does while using a Mac or PC in the office.
A growing number of apps and mobile management tools are becoming available that make it relatively easy to safely store business data in an encrypted and secure container on an iPhone or iPad. Realizing that security requires verifying a user’s identity when accessing specific apps or content after the device has been unlocked. Advantages to this include significant increases in mobile data security and the ability to wipe just the business data off of a device if it is lost or stolen.
The downside is the need for mobile users to repeatedly enter credentials – a downside that one mobile developer is helping iOS users sidestep
iOS/Mobile Development Among The Most Sought After IT Skills
Dice’s monthly report of the IT job market continues to show that developers remain the most in-demand jobs. Fully half of the top ten jobs listed are for various kinds of developers with mobile app development ranking as the second most in-demand skill.
That’s not too surprising all things considered. As we noted this morning, a recent Symantec study notes that 59% of companies are actively working to create mobile versions of their internal line of business. That doesn’t even take into account customer-facing apps, which are more and more seen as a requirement.
Other in-demand development skills include Java, Microsoft .NET, web, and the rather generic software developer. Java stole the number one slot. With one exception, development skills make up the top five skill sets. The one non-developer position was related to data and network security.
Can iPhones Replace BlackBerries In Top Secret Government Agencies?
It’s getting almost painful to read reports about RIM. The ongoing hype about how great BlackBerry 10 will be mixed with the reports of layoffs, inventory sitting around warehouses, the company’s share price plummeting – it all reminds me of the time one of my high school friends broke her ankle in gym class and hobbled around for nearly half a day trying to convince herself that she’d only sprained it.
Among all that news, however, is a question – can organizations that need incredible security manage in a world without RIM and the manageability made possible by its BlackBerry Enterprise Server (BES)? Is iOS up to that challenge? Is Apple up to or interested in making a major play for the enterprise market?
83% Of People Would Try To Access Corporate Data On a Lost iPhone
The bring your own device (BYOD) movement and the broader trend of increased mobile solutions are driving a very ambivalent dialog in most business, schools, and government agencies. On one hand, iPhones, iPads, and other mobile technologies are increasing user productivity and satisfaction (often while improving customer engagement). On the other hand, many devices contain sensitive data and are far from being truly secure.
A handful of studies released over the past few days highlight the often-schizophrenic nature of the discussions taking place in many workplaces – including on experiment that showed 83% of individuals finding a lost corporate smartphone would attempt to access corporate data on it.
Credit Card Dock Holds iPad And Square Reader Securely
You know your product is successful when somebody starts selling accessories for it. But what about when people start selling accessories for accessories, which work together with the original product? This happens: the New iPad Credit Card Dock, a perspex frame which holds both and iPad and a Square credit card reader.
The New Maclocks MacBook Pro Security Case Helps You Say Goodbye To The Kensington Lock
In an effort to create the thinnest, lightest MacBook Pro it has ever released, Apple did away with a number of features that MacBook Pro users have become accustomed to, including the Kensington security lock. That means, of course, that you can no longer secure your $2,800 notebook to a table in Starbucks, and that it could easily be stolen from right under your nose the second you get up to order another cappuccino.
But Maclocks has a solution: the world’s first MacBook Pro security case and lock.
Silent Circle Will Keep Your iPhone’s Data From Being Intercepted
No matter how careful you think you are, there’s always a chance that when you send an e-mail, text message, or make a call on your iPhone, someone could intercept it. For those who are concerned about security on their phones, a new suite of applications called Silent Circle will provide just the peace of mind you need to use your iPhone without worry.
In The Race For iOS Support & BYOD, IT Is Leaving Critical Vulnerabilities Unpatched
BYOD and ever-increasing mobility are business trends that are forcing many organizations to take a fresh look at security. The idea of employees connecting from home, coffee shops, and even planes has led to an overall increasing awareness of the need to secure remote connections. At the same time, business data residing on the iPhones, iPads, and other mobile devices of those employees is causing the IT industry to take a fresh look at mobile device security.
That is, of course, a good thing. With the focus on mobile security, however, many IT organizations are letting the security and overall design of their core networks to become outdated – and exposing their companies to incredible risks in the process.
Mountain Lion’s New Security Update Feature – Good For Users, A Potential Headache for IT
Following the Flashback malware scare this spring, Apple is stepping up its focus on security and malware protection in Mountain Lion. The release notes for the latest Mountain Lion developer preview include references to a “new Mountain Lion Security Updates system” that checks for security updates on a daily basis, uses a more secure connection when communicating with Apple’s update servers, and can install required updates automatically when a Mac is restarted.
Based on the release notes for the system, Apple is making the security update process automatic and has designed it to runs as a system process rather than a user task. Presumably that means it will function without a user logged in or while non-admin users are logged in. All in all, that’s similar to Microsoft’s Windows update feature and a good thing for users.
That doesn’t mean that this setup will be great fit for businesses, schools, and other organizations with large Mac populations.
Apple Increases Mountain Lion Security With Daily Update Checks, Automatic Installs, More
Apple has increased the security of its fourth OS X Mountain Lion developer preview by introducing a number of new security features that will presumably become part of the software’s public release next month.
BlackBerry versus iOS Management – It’s A Cultural Difference
Despite its continuing downward spiral, many IT professionals continue to acknowledge that RIM’s BlackBerry platform — or more accurately its BlackBerry Enterprise Server (BES) — remains the most secure mobile platform on the market. That’s a fact RIM hypes every chance it gets. Usually RIM points out that BES supports over 500 security and management policies. That’s roughly ten times the number of discrete management options that Apple has built into iOS.
While that number sounds impressive, the real difference between BlackBerry management and iOS management isn’t really about the number of policies. In many ways, it isn’t even about what IT can or can’t manage. The real difference is a cultural divide in the way mobile devices and mobile management is perceived.
The Rush To Create iOS Apps Can Leave Company Data Exposed And Vulnerable
Many IT departments are under intense pressure to develop and implement a range of mobility initiatives. Those initiatives often span a range of IT disciplines. There’s the effort to develop internal apps, provide access to new and legacy systems from mobile devices like the iPhone and iPad, the need to manage and support users devices as part of BYOD programs, and the need to develop customer-facing solutions like mobile-oriented sites and native apps.
With so many pressures hitting IT organizations at the same, compromises are being made because of tight deadlines and budgets. According to security expert Jeff Williams, that push to get solutions out as quickly as possible may result in solutions that have major security flaws in them.
Gen-Y Workers’ Attitudes On BYOD Pose Big Security Concerns For IT
Enterprise security vendor Fortinet decided that the best way to understand members of the millennial generation (or Gen-Y) and their potential impact on IT and security policies was to ask them directly for their views on technology in the workplace. What Fortinet learned will probably keep CIOs and IT leaders up at night.
Most millenials view BYOD programs and the ability to choose the technology they use for work as a right rather than a privilege and have few qualms about outright ignoring policies that restrict that right – even in situations where they know that important data breaches could be the result.
Most worrying for IT leaders, however, is that most young workers feel that device and data security is their personal responsibility even when sensitive business data is stored on or accessed from their personal iPhone, iPad, or other device.
This Dev’s Apple Design Award Was Nearly Mistaken For A Terrorist Device By The TSA
In a post-9/11 environment, the TSA is suspicious of everything. Shoes. Bottles of water. What you look like underneath your clothes. Everything
So when Game Collage developer Juraj Hlaváč flew back from last week’s WWDC and was discovered with a mysterious black box in his backpack that resisted all attempts to be scanned by the airport’s security equipment, and mysteriously glowed to boot, the TSA quickly became suspicious.
Luckily, before it became cavity search suspicious, Hlaváč revealed the true nature of the black box in his bag: an Apple Design Award for his app, Bobo Explores Light.
New iOS 6 Privacy Settings Limit Access To Photos, Contact, Calendars And More
The iOS6 beta brings much finer-grained controls to the privacy settings, letting you specify just what services any app will have access to. Previously you’d get an alert whenever an app wanted to know your location. Now you’ll see the same kind of alert when apps ask to use data from your calendars, contacts, reminders and photos.
iSimplyConnect Reinvents VPN For iPad Business Users
Secure remote access has always been important for companies with mobile workers. As Apple and other mobile technology companies enable an increasingly mobile workforce, however, those remote access needs are increasing rapidly and can easily strain existing VPN setups.
Increasing capacity can be accomplished with the traditional appliance or server-driven VPN solutions, but that can get expensive and doesn’t guarantee that even more capacity won’t be needed in a few months or a couple of years. One company offering a scalable and cost-effective solution to these challenges is iSimplyConnect.
Massive LinkedIn Security Breach Leads To 6.5 Million Stolen Passwords
Professional social network giant LinkedIn has acknowledged that it is looking into a massive data breach. As a result of the breach as many as 6.5 million user accounts may have been compromised. Account data including login information and passwords have been leaked and posted to a Russian hacker site. Although LinkedIn hasn’t confirmed the breach or detailed which accounts might have been impacted, the fact that the company is acknowledging the potential threat and investigating it is a big cause for concern.
At this time, it’s better to err on the side of caution.
If you use LinkedIn, you should consider that your account data has been compromised and change your password immediately.