Why BYOD is the best problem IT departments ever faced
By Tara Savage, Security Marketing Manager, BT The rise and rise of BYOD has to be seen as a welcome challenge to organisations. A challenge because it undoubtedly brings security concerns, and welcome...
View ArticleBYOD — it’s now ‘when’ not ‘if’, and China’s leading the way
An incredible 92 per cent of employees in China can take advantage of BYOD, but in the UK less than a third can do this — what does China know that we don’t? Jeff Schmidt, head of security technology...
View ArticleEducate or Eradicate? The growth of social networking
By Carl Blackett, ICT Security Architect, Norfolk County Council In this new age of ‘instant information’ is it short sighted to block social networking sites within an organisation purely because of...
View ArticleTrust Matters Series issue 2
Risk matters…so does trust By Bryan K. Fite, BT Assure US & C Portfolio Manager Many organisations do not manage risk in a holistic way. Rather, they maintain silos of risk-management activity that...
View ArticleLong Live Big Iron
By Bruce Bonsall, CISSP – BT, Senior Security Strategist For the past 25 or 30 years, information systems have become increasingly distributed. In the early days of computers, paper tape and card...
View ArticleIs your stationery stationary?
By Bruce Bonsall, CISSP – BT, Senior Security Strategist I tried to donate an electric typewriter to a couple of charities but they didn’t want it; apparently, there isn’t much of an after-market for...
View ArticleNo man is an island
Dave Martin, Senior Manager Cyber Security, Logica Business Consulting We all use the worldwide web from home, office and from our smartphones. These devices allow access to information worldwide from...
View ArticleSectors divided in attitudes to cyber-security
By Jeff Schmidt, BT Executive Global Head of Business Continuity, Security and Governance, BT Global Services IT managers from different sectors appear split over attitudes to cyber-security, according...
View ArticleMay the (en)Force(ment) be with you: Security lessons from Star Wars
By guest blogger Terry Greer-King, UK MD for Check Point Star Wars: A New Hope is more than just an epic tale of the galaxy-wide struggle between the Galactic Empire and the Rebellion, and the triumph...
View ArticleBring Your Own Leisure Suit (BYOLS)
By Bruce Bonsall, CISSP – BT, Senior Security Strategist I got some new shorts this past weekend. They’re a couple of inches longer than the ones from last year. My son told me not to wear the old ones...
View ArticleDecrease your perimeter, broaden your horizons
by Carl Blackett, ICT Security Architect, Norfolk County Council There’s always been a need to protect your assets, whether this is a personal asset (within your house) or a corporate asset (within...
View ArticleMaking BYOD Work for You
By Jeff Schmidt, Global Head of Business Continuity, Security and Governance, BT Global Services Let’s face it: there’s no use fighting the Bring Your Own Device (BYOD) trend. While it may be the stuff...
View ArticleBalancing mobile consumerisation with data loss prevention
By Tara savage, Security Marketing Manager, BTGS With the rise and rise of BYOD (bring your own device) many organisations are concerned about the security implications of having devices like personal...
View ArticleA Right to Privacy?
Phil Packman, General Manager, Security Engineering & Customer Advocacy This summer I was very proud to have the opportunity to play a major role in the Network Perimeter Security for this year’s...
View ArticleBalancing security and accessibility in BYOD
Allowing staff to work on their own devices would seem to benefit both people and their employers. The company saves money and people get to bring their own, familiar machines to work, using programmes...
View ArticleBYOD in small businesses
The debate around BYOD (bring your own device) often ignores the business issues for small and medium sized enterprises (SMEs); particularly when many of the flagship examples of successful BYOD...
View ArticleFlexibility works both ways
By Carl Blackett, ICT Security Architect, Norfolk County Council There has been a steady increase in the requirement for flexible working patterns within the workplace. Previously when employees...
View ArticleRisk Reduction Through IT Collaboration – Part 2
Jill Knesek, Global Practice Head – Advise Assure, BT Global Services, continues on from her blog last week on risk reduction through collaboration. To read part one click here. Continuing with...
View ArticleThe Reality of Virtual Security
By Bruce Bonsall, Senior Security Strategist, BT Assure Almost too many choices The growing availability of cloud services delivered electronically via the Internet, provides organizations a lot of...
View ArticleAre your people your weakest link?
The consumerisation of IT has stretched the boundaries of network security, and we’ve devoted a lot of time to talking about how trends like BYOD and cloud have changed the game for security...
View Article
More Pages to Explore .....