security - page 19

Many Companies Supporting Employee iPhones And iPads Ignore Mobile Security

By

A growing number of companies embracing BYOD are ignoring mobile security issues.
A growing number of companies embracing BYOD are ignoring mobile security issues.

The number of companies investing in mobile management and security solutions related to bring your own device (BYOD) programs is growing, but not nearly as fast as the number of companies that are actually offering BYOD to their employees. The result is that many companies are putting themselves and their data at risk by jumping onto the BYOD bandwagon too quickly and without properly securing employee iPhones, iPads, and other devices or the business data that is stored on them.

Mountain Lion Offers Dozens Of New Features For Business Users

By

Many of Mountain Lion's new features are perfect for businesses, schools, and enterprises.
Many of Mountain Lion's new features are perfect for businesses, schools, and enterprises.

Mountain Lion includes over 200 new features. Some of them are dramatic and hard to miss while others are minor conveniences that don’t stand out immediately. Many of those big and small new features and improvements have a lot of appeal for business users.

Here’s a list of the many new features in Mountain Lion that can help professionals in almost any industry work smarter, more efficiently, and more effectively.

These Mac Utilities And Enterprise Tools Are Ready To Roll With Mountain Lion

By

Some Mac security and Mac management tools already support Mountain Lion, but there are many that haven't gotten their yet.
Some Mac security and Mac management tools already support Mountain Lion, but there are many that haven't gotten their yet.

Many Mountain Lion apps will function normally under Mountain Lion, but many won’t. Of particuar concern are the various utilities that help keep Mac systems secure, scan for viruses and malware, integrate with enterprise systems in businesses and schools, and dianose and repair problems.

These tools often require much deeper integration with OS X than other apps. That means that developers need to ensure they function as intended and don’t damage any documents, files, OS X system components, or other apps. That can sometimes delay releases of key utilities.

Here’s a list of Mac utilities and enterprise tools that have confirmed Mountain Lion Compatibility

iOS 6 Fix For In-App Purchasing Exploit Cannot Be Bypassed

By

in-app-purchases1
Apple takes down the exploit that bypassed in-app purchases like this one.

Apple’s fight against Russian hacker Alex Borodin, who took advantage of an in-app purchasing exploit to provide users with paid content for free, has paid off. The Cupertino company has developed a fix that will make its debut in iOS 6, which is almost impossible to bypass, according to Borodin.

Apple’s iCloud and Gatekeeper Make Businesses Choose One Security Risk Over Another

By

Mountain Lion's consumer security and cloud features conflict in schools and workplaces.
Mountain Lion's consumer security and cloud features conflict in schools and workplaces.

In putting together the various features of Mountain Lion, Apple may end up encouraging business and enterprise customers to actually make their Macs less secure instead of ratcheting up security as some key Mountain Lion capabilities are intended to do.

There are a handful of technologies involved, but they center around iCloud and Apple’s requirement that apps sold in the Mac App Store support Apple’s application sandboxing technique.

19% Of iOS Apps Access Your Address Book Without Your Permission… Until iOS 6 [Report]

By

Do you know which apps are accessing your personal data?
Do you know which apps are accessing your personal data?

Antivirus software specialist Bitdefender has found that nearly 19% of iOS apps access your address book without your knowledge — or your consent — when you’re using them, and 41% track your location. What’s most concerning is over 40% of them don’t encrypt your data once it has been collected.

That’s all going to change when iOS 6 makes its debut later this year, however.

TigerText With Dropbox Offers Secure Multiplatform Messaging And File Sharing

By

TigerText now offers secure file sharing as well as secure messaging thanks to Dropbox.
TigerText now offers secure file sharing as well as secure messaging thanks to Dropbox.

Email and messaging continue to be core business requirements for mobile professionals. Business messaging can also present a mobile security challenges. Ensuring communications sent over a carrier network or Wi-Fi are secure and only read by intended recipients is sensible for any company. In certain industries, secure messaging is required by law or regulation.

There are a range of ways to ensure secure messaging. One of which is TigerText, a multi-platform solution for secure messaging that meets industry-specific security and privacy require like HIPAA in the healthcare industry or SOX compliance in business/finance. TigerText offers more than just secure texting, however. The platform also includes group messaging and the ability to recall messages after they’ve been sent.

As of today, it also include Dropbox integration. That allows users to not only exchange messages securely, but also to share files securely with some attractive business and security features.

Safely Move Keychain Files From Your Old Mac To A New One [OS X Tips]

By

Keychain Access

Copying files to a new Mac? Perhaps one of them newfangled MacBook Pros? While most of us use Migration Assistant to move our files from one Mac to a new one, it may not be an option in your particular case. I’ve definitely wanted to move just the bare minimum of files over to a new Mac before, and today’s tip should help with just that.

The Keychain is a place to store passwords and login information, and it’s fairly easy to move your Mac’s Keychain to a new one. Here’s how.

Bitzer Mobile Makes Secures Data On Business iOS Devices Easier To Access

By

Bitzer streamlines the process of accessing secure business data/resources on iOS devices.
Bitzer streamlines the process of accessing secure business data/resources on iOS devices.

One of the things that can frustrate mobile users when using an iPhone or iPad for work is needing to repeatedly enter passcodes other user account credentials like a user name and password. Often because of a mobile device’s size and virtual keyboard, this process can seem more onerous than it does while using a Mac or PC in the office.

A growing number of apps and mobile management tools are becoming available that make it relatively easy to safely store business data in an encrypted and secure container on an iPhone or iPad. Realizing that security requires verifying a user’s identity when accessing specific apps or content after the device has been unlocked. Advantages to this include significant increases in mobile data security and the ability to wipe just the business data off of a device if it is lost or stolen.

The downside is the need for mobile users to repeatedly enter credentials – a downside that one mobile developer is helping iOS users sidestep

iOS/Mobile Development Among The Most Sought After IT Skills

By

False versions of Xcode may have gotten into your apps; here's how to fix the problem.
According to Dice, mobile app development is the second most sought after IT skill set.
Photo: Apple

Dice’s monthly report of the IT job market continues to show that developers remain the most in-demand jobs. Fully half of the top ten jobs listed are for various kinds of developers with mobile app development ranking as the second most in-demand skill.

That’s not too surprising all things considered. As we noted this morning, a recent Symantec study notes that 59% of companies are actively working to create mobile versions of their internal line of business. That doesn’t even take into account customer-facing apps, which are more and more seen as a requirement.

Other in-demand development skills include Java, Microsoft .NET, web, and the rather generic software developer. Java stole the number one slot. With one exception, development skills make up the top five skill sets. The one non-developer position was related to data and network security.

Can iPhones Replace BlackBerries In Top Secret Government Agencies?

By

If RIM does go belly up, can Apple be ready to meet the security needs of RIM's customers?
If RIM does go belly up, can Apple be ready to meet the security needs of RIM's customers?

It’s getting almost painful to read reports about RIM. The ongoing hype about how great BlackBerry 10 will be mixed with the reports of layoffs, inventory sitting around warehouses, the company’s share price plummeting – it all reminds me of the time one of my high school friends broke her ankle in gym class and hobbled around for nearly half a day trying to convince herself that she’d only sprained it.

Among all that news, however, is a question – can organizations that need incredible security manage in a world without RIM and the manageability made possible by its BlackBerry Enterprise Server (BES)? Is iOS up to that challenge? Is Apple up to or interested in making a major play for the enterprise market?

83% Of People Would Try To Access Corporate Data On a Lost iPhone

By

Symantec
Symantec "lost smartphone" simulation shows most people would try to access corporate data and apps on a lost device.

The bring your own device (BYOD) movement and the broader trend of increased mobile solutions are driving a very ambivalent dialog in most business, schools, and government agencies. On one hand, iPhones, iPads, and other mobile technologies are increasing user productivity and satisfaction (often while improving customer engagement). On the other hand, many devices contain sensitive data and are far from being truly secure.

A handful of studies released over the past few days highlight the often-schizophrenic nature of the discussions taking place in many workplaces – including on experiment that showed 83% of individuals finding a lost corporate smartphone would attempt to access corporate data on it.

Credit Card Dock Holds iPad And Square Reader Securely

By

wpid-Photo-02072012-1301.jpg
Now even hippie market sellers can take plastic.

 

 

You know your product is successful when somebody starts selling accessories for it. But what about when people start selling accessories for accessories, which work together with the original product? This happens: the New iPad Credit Card Dock, a perspex frame which holds both and iPad and a Square credit card reader.

The New Maclocks MacBook Pro Security Case Helps You Say Goodbye To The Kensington Lock

By

Add a security lock to your new MacBook Pro to ensure it isn't a target for coffee shop conmen.
Add a security lock to your new MacBook Pro to ensure it isn't an easy target for coffee shop con men.

In an effort to create the thinnest, lightest MacBook Pro it has ever released, Apple did away with a number of features that MacBook Pro users have become accustomed to, including the Kensington security lock. That means, of course, that you can no longer secure your $2,800 notebook to a table in Starbucks, and that it could easily be stolen from right under your nose the second you get up to order another cappuccino.

But Maclocks has a solution: the world’s first MacBook Pro security case and lock.

In The Race For iOS Support & BYOD, IT Is Leaving Critical Vulnerabilities Unpatched

By

Is the focus on iOS and other mobile devices becoming too big of a priority for IT?
Is the focus on iOS and other mobile devices becoming too big of a priority for IT?

BYOD and ever-increasing mobility are business trends that are forcing many organizations to take a fresh look at security. The idea of employees connecting from home, coffee shops, and even planes has led to an overall increasing awareness of the need to secure remote connections. At the same time, business data residing on the iPhones, iPads, and other mobile devices of those employees is causing the IT industry to take a fresh look at mobile device security.

That is, of course, a good thing. With the focus on mobile security, however, many IT organizations are letting the security and overall design of their core networks to become outdated – and exposing their companies to incredible risks in the process.

Mountain Lion’s New Security Update Feature – Good For Users, A Potential Headache for IT

By

Will Mountain Lion's new security system be a hit or a miss for schools and businesses?
Will Mountain Lion's new security system be a hit or a miss for schools and businesses?

Following the Flashback malware scare this spring, Apple is stepping up its focus on security and malware protection in Mountain Lion. The release notes for the latest Mountain Lion developer preview include references to a “new Mountain Lion Security Updates system” that checks for security updates on a daily basis, uses a more secure connection when communicating with Apple’s update servers, and can install required updates automatically when a Mac is restarted.

Based on the release notes for the system, Apple is making the security update process automatic and has designed it to  runs as a system process rather than a user task. Presumably that means it will function without a user logged in or while non-admin users are logged in. All in all, that’s similar to Microsoft’s Windows update feature and a good thing for users.

That doesn’t mean that this setup will be great fit for businesses, schools, and other organizations with large Mac populations.

BlackBerry versus iOS Management – It’s A Cultural Difference

By

iphone-4-blackberry
Going from BlackBerry to iOS management is a culture shift, but that can be a good thing.

Despite its continuing downward spiral, many IT professionals continue to acknowledge that RIM’s BlackBerry platform — or more accurately its BlackBerry Enterprise Server (BES) — remains the most secure mobile platform on the market. That’s a fact RIM hypes every chance it gets. Usually RIM points out that BES supports over 500 security and management policies. That’s roughly ten times the number of discrete management options that Apple has built into iOS.

While that number sounds impressive, the real difference between BlackBerry management and iOS management isn’t really about the number of policies. In many ways, it isn’t even about what IT can or can’t manage. The real difference is a cultural divide in the way mobile devices and mobile management is perceived.

The Rush To Create iOS Apps Can Leave Company Data Exposed And Vulnerable

By

FBI director isn't too keen on Apple's security measures.
Companies developing internal iOS apps need to ensure those apps don't compromise security.
Photo: 1Password

Many IT departments are under intense pressure to develop and implement a range of mobility initiatives. Those initiatives often span a range of IT disciplines. There’s the effort to develop internal apps, provide access to new and legacy systems from mobile devices like the iPhone and iPad, the need to manage and support users devices as part of BYOD programs, and the need to develop customer-facing solutions like mobile-oriented sites and native apps.

With so many pressures hitting IT organizations at the same, compromises are being made because of tight deadlines and budgets. According to security expert Jeff Williams, that push to get solutions out as quickly as possible may result in solutions that have major security flaws in them.

Gen-Y Workers’ Attitudes On BYOD Pose Big Security Concerns For IT

By

Millennial workers view BYOD as a right and device security as their personal responsibility
Millennial workers view BYOD as a right and device security as their personal responsibility

Enterprise security vendor Fortinet decided that the best way to understand members of the millennial generation (or Gen-Y) and their potential impact on IT and security policies was to ask them directly for their views on technology in the workplace. What Fortinet learned will probably keep CIOs and IT leaders up at night.

Most millenials view BYOD programs and the ability to choose the technology they use for work as a right rather than a privilege and have few qualms about outright ignoring policies that restrict that right – even in situations where they know that important data breaches could be the result.

Most worrying for IT leaders, however, is that most young workers feel that device and data security is their personal responsibility even when sensitive business data is stored on or accessed from their personal iPhone, iPad, or other device.

This Dev’s Apple Design Award Was Nearly Mistaken For A Terrorist Device By The TSA

By

ada

In a post-9/11 environment, the TSA is suspicious of everything. Shoes. Bottles of water. What you look like underneath your clothes. Everything

So when Game Collage developer Juraj Hlaváč flew back from last week’s WWDC and was discovered with a mysterious black box in his backpack that resisted all attempts to be scanned by the airport’s security equipment, and mysteriously glowed to boot, the TSA quickly became suspicious.

Luckily, before it became cavity search suspicious, Hlaváč revealed the true nature of the black box in his bag: an Apple Design Award for his app, Bobo Explores Light.

New iOS 6 Privacy Settings Limit Access To Photos, Contact, Calendars And More

By

privacy.jpg

Photo apps need never confuse morons again.

The iOS6 beta brings much finer-grained controls to the privacy settings, letting you specify just what services any app will have access to. Previously you’d get an alert whenever an app wanted to know your location. Now you’ll see the same kind of alert when apps ask to use data from your calendars, contacts, reminders and photos.

iSimplyConnect Reinvents VPN For iPad Business Users

By

iSimplyConnect makes support remote iPad and iPhone users simple and cost-effective.
iSimplyConnect makes support remote iPad and iPhone users simple and cost-effective.

Secure remote access has always been important for companies with mobile workers. As Apple and other mobile technology companies enable an increasingly mobile workforce, however, those remote access needs are increasing rapidly and can easily strain existing VPN setups.

Increasing capacity can be accomplished with the traditional appliance or server-driven VPN solutions, but that can get expensive and doesn’t guarantee that even more capacity won’t be needed in a few months or a couple of years. One company offering a scalable and cost-effective solution to these challenges is iSimplyConnect.

Massive LinkedIn Security Breach Leads To 6.5 Million Stolen Passwords

By

Massive data breach exposes 6.5 million LinkedIn passwords
Massive data breach exposes 6.5 million LinkedIn passwords

Professional social network giant LinkedIn has acknowledged that it is looking into a massive data breach. As a result of the breach as many as 6.5 million user accounts may have been compromised. Account data including login information and passwords have been leaked and posted to a Russian hacker site. Although LinkedIn hasn’t confirmed the breach or detailed which accounts might have been impacted, the fact that the company is acknowledging the potential threat and investigating it is a big cause for concern.

At this time, it’s better to err on the side of caution.

If you use LinkedIn, you should consider that your account data has been compromised and change your password immediately.