Quantcast
Channel: Let's Talk Security » BYOD
Browsing all 61 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Why BYOD is the best problem IT departments ever faced

By Tara Savage, Security Marketing Manager, BT The rise and rise of BYOD has to be seen as a welcome challenge to organisations. A challenge because it undoubtedly brings security concerns, and welcome...

View Article



Image may be NSFW.
Clik here to view.

BYOD — it’s now ‘when’ not ‘if’, and China’s leading the way

An incredible 92 per cent of employees in China can take advantage of BYOD, but in the UK less than a third can do this — what does China know that we don’t? Jeff Schmidt, head of security technology...

View Article

Image may be NSFW.
Clik here to view.

Educate or Eradicate? The growth of social networking

By Carl Blackett, ICT Security Architect, Norfolk County Council In this new age of ‘instant information’ is it short sighted to block social networking sites within an organisation purely because of...

View Article

Trust Matters Series issue 2

Risk matters…so does trust By Bryan K. Fite, BT Assure US & C Portfolio Manager Many organisations do not manage risk in a holistic way. Rather, they maintain silos of risk-management activity that...

View Article

Long Live Big Iron

By Bruce Bonsall, CISSP – BT, Senior Security Strategist For the past 25 or 30 years, information systems have become increasingly distributed. In the early days of computers, paper tape and card...

View Article


Image may be NSFW.
Clik here to view.

Is your stationery stationary?

By Bruce Bonsall, CISSP – BT, Senior Security Strategist I tried to donate an electric typewriter to a couple of charities but they didn’t want it; apparently, there isn’t much of an after-market for...

View Article

No man is an island

Dave Martin, Senior Manager Cyber Security, Logica Business Consulting We all use the worldwide web from home, office and from our smartphones. These devices allow access to information worldwide from...

View Article

Image may be NSFW.
Clik here to view.

Sectors divided in attitudes to cyber-security

By Jeff Schmidt, BT Executive Global Head of Business Continuity, Security and Governance, BT Global Services IT managers from different sectors appear split over attitudes to cyber-security, according...

View Article


Image may be NSFW.
Clik here to view.

May the (en)Force(ment) be with you: Security lessons from Star Wars

By guest blogger Terry Greer-King, UK MD for Check Point  Star Wars: A New Hope is more than just an epic tale of the galaxy-wide struggle between the Galactic Empire and the Rebellion, and the triumph...

View Article


Image may be NSFW.
Clik here to view.

Bring Your Own Leisure Suit (BYOLS)

By Bruce Bonsall, CISSP – BT, Senior Security Strategist I got some new shorts this past weekend. They’re a couple of inches longer than the ones from last year. My son told me not to wear the old ones...

View Article

Image may be NSFW.
Clik here to view.

Decrease your perimeter, broaden your horizons

by Carl Blackett, ICT Security Architect, Norfolk County Council There’s always been a need to protect your assets, whether this is a personal asset (within your house) or a corporate asset (within...

View Article

Image may be NSFW.
Clik here to view.

Making BYOD Work for You

By Jeff Schmidt, Global Head of Business Continuity, Security and Governance, BT Global Services Let’s face it: there’s no use fighting the Bring Your Own Device (BYOD) trend. While it may be the stuff...

View Article

Image may be NSFW.
Clik here to view.

Balancing mobile consumerisation with data loss prevention

By Tara savage, Security Marketing Manager, BTGS With the rise and rise of BYOD (bring your own device) many organisations are concerned about the security implications of having devices like personal...

View Article


Image may be NSFW.
Clik here to view.

A Right to Privacy?

Phil Packman, General Manager, Security Engineering & Customer Advocacy This summer I was very proud to have the opportunity to play a major role in the Network Perimeter Security for this year’s...

View Article

Image may be NSFW.
Clik here to view.

Balancing security and accessibility in BYOD

Allowing staff to work on their own devices would seem to benefit both people and their employers. The company saves money and people get to bring their own, familiar machines to work, using programmes...

View Article


Image may be NSFW.
Clik here to view.

BYOD in small businesses

The debate around BYOD (bring your own device) often ignores the business issues for small and medium sized enterprises (SMEs); particularly when many of the flagship examples of successful BYOD...

View Article

Image may be NSFW.
Clik here to view.

Flexibility works both ways

By Carl Blackett, ICT Security Architect, Norfolk County Council There has been a steady increase in the requirement for flexible working patterns within the workplace.  Previously when employees...

View Article


Image may be NSFW.
Clik here to view.

Risk Reduction Through IT Collaboration – Part 2

Jill Knesek, Global Practice Head – Advise Assure, BT Global Services, continues on from her blog last week on risk reduction through collaboration. To read part one click here. Continuing with...

View Article

Image may be NSFW.
Clik here to view.

The Reality of Virtual Security

By Bruce Bonsall, Senior Security Strategist, BT Assure Almost too many choices The growing availability of cloud services delivered electronically via the Internet, provides organizations a lot of...

View Article

Image may be NSFW.
Clik here to view.

Are your people your weakest link?

The consumerisation of IT has stretched the boundaries of network security, and we’ve devoted a lot of time to talking about how trends like BYOD and cloud have changed the game for security...

View Article
Browsing all 61 articles
Browse latest View live




Latest Images