security - page 20

Does Siri Belong In Business? [Feature]

By

Siri
Does Siri belong in the workplace? If so, is it worth potential security and privacy issues?

The news that IBM bans Siri for every employee that has an iPhone 4S and participates the company’s BYOD program unleashed a lot of discussion about whether the company was being paranoid or prudent. One of the bigger questions to come out of all that discussion was a reframing of the issue itself – does Siri have a place in the business world to begin with?

Setting aside the security and privacy issues that led IBM to ban Siri, are there compelling use cases for Siri in the workplace? If there are, do they outweigh the privacy and security concerns? Could Apple do more to make Siri business-friendly?

Protect Yourself When Using Cloud Services & Personal Tech In The Office

By

clouds_320
Personal clouds can cause professional headaches in the workplace

One of the challenges that the BYOD and consumerization trends are creating for IT departments is employee use of public and/or personal cloud services. We’ve covered some of the big challenges this presents in terms of data security and ownership as well as the potential business continuity problems stemming from multiple versions of documents stored across different cloud services by multiple employees.

IT concerns may be more common and well-known, but there are cloud-related issues that employees need to consider as well – particularly if they use a work email address to register for a service, access a service from work, or use a service to store or transfer work-related files.

iPhone/iPad-toting CEOs & Executives Most Likely To Ignore Security Rules

By

Executives and senior managers are the most likely to ignore security guidelines
Executives and senior managers are the most likely to ignore security guidelines

The biggest challenge for many business when dealing with the consumerization of IT and BYOD trends is often cultural. IT needs to cede control of devices, app choices, and where/when employees and executives actually interact with corporate data. That’s a cultural shift for IT. There’s an equal cultural shift that needs to happen when it comes to users and executives who must take at least partial responsibility for keeping their iPhones, iPads, or other devices secure along with the business data on them.

This requires user education and solid communication between users and IT. To be truly effective, security policies need to be endorsed by senior management and adoption and understanding of them needs to follow from the top down through the organization.

Unfortunately, that isn’t what’s happening in many businesses. In fact, the people most likely to ignore or violate such policies are C-level executives, members of the board of directors, and even IT.

Apple Practically Gives OS X Away And It Still Costs Less Than XP To Support

By

Apple's update strategy saves a lot of money over maintaining Windows XP
Apple's update strategy can save companies lot of money over maintaining Windows XP

There are a handful of intrinsic beliefs that Apple has as company – most of which came from Steve Jobs. The constant focus on building experiences rather than just products is one of them. Another is that Apple looks forward and not backward when it comes to technology. The company simply acknowledges that to offer its users truly great new experiences (and products), it cannot hold onto (and be held back by) outdated technology.

Apple often gets criticized for pushing its technologies and its users forward, particularly in business and enterprise IT circles. Despite that criticism, Apple may be doing companies (and users) a big favor by not supporting older Macs and OS X releases indefinitely as Microsoft does with Windows XP – and that advantage isn’t just about better products.

An IDC study commissioned by Microsoft discovered that supporting XP now costs companies and schools five times what it would cost them to support Windows 7 – making Apple’s forward-looking policy not only technically advantageous but also significantly less expense in the long run.

Box Ups The Ante For Business And iOS Cloud Storage

By

Box continues to lead the way in mobile and cloud options for business
Box continues to lead the way in mobile and cloud options for business

Over the past several months, Box has reinvented itself. The company went from being a pretty basic cloud storage solution to true enterprise solution and a hub for storing, viewing, and editing all manner of documents on an iPad or other mobile device. Box’s journey continued this week as the company launched a series of new features for business and enterprise customers.

Was IBM Right? Is Siri A Threat To Businesses? [Feature]

By

IBM bans Siri use on the iPhones of its employees
IBM bans Siri use on the iPhones of its employees

Apple has gotten a fair amount of flack over Siri – most of it relating to Siri not recognizing words or phrases, misinterpreting requests, or providing incomplete or inaccurate answers. Apple is even facing a class action lawsuit over Siri not working as promised by iPhone 4S ads.

For IBM, however, the concern isn’t that Siri won’t work as advertised. Big blue is worried that Siri will work exactly as advertised and that confidential and sensitive information will leak outside IBM’s network as a result. For those reasons, the company disables Siri on the iPhones of its employees.

iPhone & iPad Lead BYOD Adoption In Europe, Middle East, And Africa

By

BYOD is growing in Europe, the Middle East, and Africa with Apple in the lead
BYOD is growing in Europe, the Middle East, and Africa with Apple in the lead

Apple has been a major force in the BYOD movement. You can even argue that Apple ignited the BYOD flame with the release of the iPhone and iPad. While there have a number of studies looking at how companies in the U.S. are reacting to the trend, numbers haven’t readily been available from other markets.

That changed today with a new study that looks at BYOD in EMEA (Europe, Middle East, and Africa) business and institutions. The results show Apple devices as a clear preference in these markets, somewhat more limited BYOD adoption, and many of the same security concerns discussed by U.S. firms.

Many CIOs Make A Dangerous Assumption That No iPhones, iPads Are In Their Companies

By

Are there iPhones or iPads in your company? Does your CIO know about them?
Are there iPhones or iPads in your company? Does your CIO know about them?

Are BYOD programs really all that common? According to a new report from staffing and recruiting firm Robert Half, the answer is that they aren’t. In fact, according to the report many CIOs and IT departments don’t allow employees to use personal devices. That runs contrary to a lot of other data that shows the iPhone, iPad, and other personal technologies are increasingly finding their ways into the office.

The immediate judgement might be to throw out this report or others because of the disconnect between them. That wouldn’t be a wise course of action, however. In fact, putting this report and another recent study that we covered last week side by side indicates that many CIOs may be dangerously unaware of what’s going on in their companies.

Adobe Got Burned For Ending Legacy Support – Will The Same Thing Happen To Apple?

By

Adobe backpedals after demanding users upgrade to receive security patches
Adobe backpedals after demanding users upgrade to receive security patches

Last week, Adobe created a firestorm of user unrest when it issued a series of security bulletins impacting three applications of its Creative Suite and said that users must pay to upgrade to the latest versions of the apps if they wanted patches that would close the vulnerabilities.

The company was quickly besieged by users, technology professionals, and security experts demanding that it reverse course and offer security patches to users who couldn’t afford the upgrades (or didn’t want to spend the money). Even though company quietly backpedaled and announced it would offer security updates without acknowledging the reason for its about face or offering an apology, the gaffe raises concerns that Apple’s yearly OS X release cycle might lead it down a similar path.

Most Companies Don’t Have Mobile Security Covered As Well As They Think

By

bigstockphoto_data_security_2346522
Mobile security isn't as tight as many companies think

Businesses and individuals thinking that they have mobile security covered, may need to think again. That’s the message from a new report on mobile security shows that nearly half of people using a personal device like an iPhone, iPad, or Android device are doing so without their company’s knowledge or permission. The same report showed that users frequently access sensitive or confidential data from mobile devices but would stop after a security breach.

Adding to concerns around personal mobile devices and BYOD programs, one third of IT professionals in the survey said that their company has already experienced a mobile-related security incident.

Logitech’s iOS-Compatible Security Camera Sees In The Dark

By

night-vision.jpg

Enjoy the feelings of impotence you can only get from remote-viewing the vandalization of your home

I have mixed thoughts on home-monitoring systems. On the one hand, you get some peace of mind knowing when the house is empty. But on the other, if the worst does happen, you get to watch the burglar burglarize your home, live, as it happens. I guess at the very least, you do have a warning not to use that toothbrush ever again. Not after the burglar stuck it in his [That’s enough! -Ed].

Still, if you’re going to add cameras to the house, then Logitech’s new “Alert 750n Indoor Master System – with Night Vision” looks pretty good. It uses your home’s powerlines to both power the camera and connect it to the network, and you can monitor it from an iOS app.

iOS 5.1.1 Patches Important URL Spoofing Vulnerability In Safari

By

Apple has fixed an important security issue in iOS 5.1.1.
Apple has fixed an important security issue in iOS 5.1.1.

Apple released iOS 5.1.1 for iOS device owners today over-the-air and in iTunes. The update brings several bug fixes and improvements, including a fix for certain iPads that loose connectivity when switching between 2G and 3G networks.

An important security update has also been included in iOS 5.1.1 for a URL spoofing technique in Safari that made the news a couple weeks ago.

Mobile Security – Simple Username and Password Isn’t Good Enough

By

More mobility requires more security options that just a username and password
More mobility requires more security options that just a username and password

There’s plenty of news out there about the way mobile technology, BYOD programs, and other facets of the consumerization of IT trend are reshaping the workplace and the IT department. The traditional daily routine of typing a username and password into PC in the morning, using that computer all day long, and shutting it down before heading home is gone for many of us.

Today, we use a mix of devices in the office, during meetings, on the road, and often from home. That mix of devices, a range of different apps, cloud services, and remote access empowers us in ways that were unimaginable a few years ago. In this new workplace, however, do we need something more than the old username and password to make resources available and keep them business data secure?

IT Needs To Chill Out Before Wiping iPhones and iPads

By

Is IT too quick to jump to the remote wipe option?
Is IT too quick to jump to the remote wipe option?

BYOD programs have a tendency to worry IT departments. After decades of being charged with keeping computers, supporting devices, and data safe and in working order, losing control of hardware is a massive culture shift. Even absent a BYOD program, the growing number of mobile devices that are used outside of the office and take corporate data outside the security of an enterprise network can be disorienting for long term IT professionals.

That leads to a tendency to clamp down with every ounce of security muscle available – mobile device management (MDM) can’t entirely secure an iPhone or iPad, but they can do a pretty good job of locking it down, monitoring it in the office or on the road, and make it easy to wipe everything off of it at a moment’s notice.

Are “Beneficial Viruses” The Future Of Mobile Security?

By

bigstockphoto_data_security_2346522
Could viruses actually protect company data on an iPhone or iPad?

The BYOD movement has transformed the relationship between IT staffers and other employees in a wide range of companies. While there are benefits to BYOD, there are also headaches – and securing data on personal devices and/or securing the devices themselves is one of the biggest. While there’s an ongoing discussion about whether to manage data, apps, or devices, right now most companies are developing a strategy that has a mix of approaches.

All that could change if the mobile management industry unfolds the way Gartner analyst Ken Dulaney expects. Dulaney is an advocate of creating what he calls “beneficial viruses” that companies can layer into apps and data itself – the idea being that the data could delete itself if it becomes compromised.

The Real Reason Why Apple’s Security Is 10 Years Behind Microsoft’s

By

mac-virus-trojan

Last week, Eugene Kaspersky — the eponymous founder of the industry leading Kaspersky security company — made some waves by claiming that OS X was “at least 10 years behind Microsoft in terms of security.”

Since Kaspersky’s eyebrow-arching claim, there’s been a lot of bickering about whether what he said was true, or whether his comments were self-serving. Maybe Kaspersky’s right, though, and Apple should follow in Microsoft’s footsteps and outsource OS X security to the anti-virus industry?

Face Recognition Photo App Hopes To Sidestep Basic Flaw With A Blink [Review]

By

Dare you show your face?
Dare you show your face?

Facevault is a one-dollar photo archive app that can only be unlocked by one person – the one with the right face.

It sounds neat, and yes, it works. But the face recognition features come at a price, and are hindered by a flaw that affects other apps using the same technology: it can’t tell the difference between real faces, and photos of real faces.

New Windows Conficker Infections Put Flashback In Perspective, Offer Warning

By

Continued Conficker threat offers perspective/warning on Mac malware
Continued Conficker threat offers perspective/warning on Mac malware

News, information, and commentary of the Flashback malware threat has ricocheted around the web over the past few weeks. The news of dangerous Mac malware has spread from the Apple and tech media into the mainstream. While not downplaying the seriousness of the threat, a Microsoft announcement yesterday does offer some perspective.

Microsoft made it clear that the Conficker worm is still infecting millions of PCs worldwide – three years after fears about Conficker’s potential damage and the estimated level of infections (estimates ran as high 12 million PCs at the time) created a media frenzy.

48% Of Used Hard Drives Contain Sensitive Data – How To Be Sure Yours Won’t

By

Discarded hard drives often have residual personal data on them
Discarded hard drives often have residual personal data on them.

Many of us pass our Macs and some external devices on to others when we upgrade. Family and friends may get our hand-me-downs, but quite frequently we’ll sell an old Mac, printer, or external drive on eBay or some other venue. Regardless of where our computers and related technology end up when we outgrow them, it’s important to make sure we scrub any personal data from them.

The importance of securely erasing personal and/or business data from hardware that is being passed on, sold, or even recycled was highlighted in a recent study by Britain’s Information Commissioner’s Office, which discovered that half of all used hard drives contained information from their previous owners.

Kaspersky CEO: Apple Is “10 Years Behind Microsoft In Terms Of Security”

By

Kaspersky believes Apple needs to invest more into Mac OS X security as more and more malware infections appear.
Kaspersky believes Apple needs to invest more into Mac OS X security as more and more malware infections appear.

One of the main reasons many of us turned to Apple’s machines and its OS X operating system is the belief that the company’s software is more secure than Windows, its biggest rival. However, Eugene Kaspersky, CEO and co-founder of Kaspersky, one of the industry’s leading security specialists, believes that Apple is “10 years behind Microsoft in terms of security,” and that Apple need to invest more into security audits for its software.

New iTunes Security Questions Are Confusing And Can Be Easy To Figure Out

By

iTunes prompt for new account security questions
iTunes prompt for new account security questions

Apple recently began prompting users to select three security questions for their iTunes Store accounts. The move helps to ensure that you’re the authorized account holder if you have problems or forget your password.

The idea is well intentioned and a sensible protection for Apple and its customers. Unfortunately, Apple’s way of rolling out these security questions and the questions themselves highlight the old adage about the way to hell being paved with good intentions.

“Wake Up, Mac Users!” One In Five Macs Carry Malware

By

Kaspersky is helping Apple identify vulnerabilities in Mac OS X.
Mac users are being urged to "wake up" and realize that malware is a growing problem for Mac OS X.

Think your Mac’s safe now that you’ve removed that Flashback infection? Think again. New research conducted by security specialists Sophos has revealed a “disturbingly high level” of Macs are currently carrying malware, though much of it is designed to attack Windows machines.

Of the 100,000 Macs that Sophos analyzed, one in five was found to be carrying Windows malware, while one in 36 was carrying malware designed for and dangerous to Mac OS X.