Tag Archives: mobile security

Technology Outlook for 2016

What drivers will shape 2016 technology trends? Businesses using customer facing technology for competitive advantage will fuel demand for Cloud Computing, in particular, Software as a Service.  The Internet of Everything will amplify the number of connected devices in our world leading to additional needs for data protection and CyberSecurity defense. Mobile computing and Cloud Computing adoption will increase the adoption of fast, affordable and secure broadband networking. Here is the short list of what to expect from the biggest trends in technology for 2016.

Cloud Computing Adoption Remains Strong

Cloud Computing adoption is expected to continue throughout 2016. Software as a Service (SaaS) applications are expected to lead the way. Migration to Cloud based email, sales and customer management applications and other SaaS solutions will drive Cloud growth in 2016. Infrastructure as a Service (IaaS) will continue to grow, however demand will be driven by backup and disaster recovery, single sign on, file sync and sharing, application hosting and other core IT services.  With this increased demand for Cloud Solutions, migration and integration services are expected to also be in high demand.

Greater Need for Fast, Affordable and Secure Broadband

Mobile Computing and Cloud Computing will put additional demands on network infrastructure. With the additional need for SaaS applications, remote backup and file sync and sharing applications, companies will upgrade business Internet technology for fast and affordable broadband options. Companies will pay particular consideration to available, reliability and security as they adopt broadband network technologies.

Internet of Things (IoT):  More Devices, More Security

Tablets, Laptops, desktops and smartphones are expected to continue to grow. Now Smart Devices or Internet of Things (IoT) will put more devices in and near the workplace. Office Equipment, Watches, TVs, and cars now equipped with WiFi connections which will create additional opportunities for Cybersecurity breaches, as these devices may become targets of hackers and Cybercriminals. If compromised and connected to your network, your applications and their data may also be exposed. Maintaining network security including updated anti virus and malware definitions will have exponential importance with the abundance of more connected devices in 2016.

As  you plan and budget for next year, take these 2016 technology predictions into account. Also,  consider any additional changes in industry regulation, compliance considerations and your business growth objectives for 2016. In doing so, you will be well prepared to turn these 2016 technology trends into competitive advantage.

Bandwidth Bottleneck Coming to an End?

Telcos Bandwidth BottleneckIt is predicted that by 2017, there will be around 268 billion app downloads. The average person already uses 26 different apps per month. This growth is clearly driven by the younger work force, who use their mobile devices and tablets for both work and play. All of these apps use a lot of data, and so there is a problem on the horizon: all of this data use will lead to pervasive network strain, which will in turn result in performance problems in both apps and network-based services. This data overload creates frustration in both users and providers. App users will simply delete apps that do not perform well. This means fewer customers for Telcos and app providers.

The Data Challenge for Telcos

Therefore, Telcos have a challenge in front of them: invent new ways to improve user experience by making them more data efficient and scalable. The question on a lot of IT experts’ minds is: is it finally time for Telcos and app providers to work together to unclog the bandwidth bottleneck? The answer is still unclear, but intelligent data distribution is one solution everyone can agree on at the moment, i.e. Telcos can optimize their current network assets while app developers work to design more apps that use less data.

The Importance of Wide Area Networks Within Telcos

In order to stay sustainable, Telcos need to offer more in connectivity. A solid Wide Area Network (WAN) is essential in accelerating applications and keeping traffic separate. It is also critical for day to day business operations; it both reduces operating costs and provides a level of predictability for system performance. Wide Area Networks consolidate costly tools, such as printers, phone lines, file storage, bandwidth, and security, because these items do not have to be purchased for each individual computer. Telcos are also learning that not taking advantage of Multi Protocol Label Switching (MPLS) is putting their business at a competitive disadvantage. Telcos need to be able to interconnect multiple locations and ensure the highest level of data connectivity performance between multiple locations. Equally important for Telcos is the advent of Ethernet over Copper (EoC). For small to medium businesses, EoC can gain greater bandwidth and flexibility in order to support various IP-based applications, including disaster recovery, Cloud, and IP voice services.

Users Drive Telco and App Developer Success

Consumers will ultimately drive Telco and app developers’ transformations. If Telcos and app developers do not address the bandwidth bottleneck, app users will quickly become frustrated. The initial shock will fall to the app providers – users will not go to Telco providers when an app does not work to their liking; they will simply delete the problem application(s). But, ultimately, everybody loses if the bottleneck remains. Eventually consumers will be able to see a data rating for each app in the app store. And, if users stop downloading certain apps, both Telcos and app providers will lose revenue. Consequently, users can expect more streamlined apps from providers and more efficient networks from Telcos in the future. For more information on the future of applications, contact your trusted Telco service provider today.

How New Technology is Changing the Way Your Business Needs to Think About IT Security

New technology trends pose new security threats to businesses. CompTIA reports that 64% of companies report a “drastic or moderate” change to their security approach. In their survey, more than half of businesses recognize opportunities within their organization for security improvement. IT security priorities are currently focused on developing new corporate policies and educating employees. Businesses are no longer solely relying on annual security reviews; the majority of companies are seeking education that is more ongoing and interactive to avoid future security threats.

Modern Day IT Security

With new and evolving technologies, the overall approach to IT security must be re-evaluated from the top levels of a business. As more cloud solutions and mobile devices are being utilized within the workplace, new security products are attempting to meet the needs of modern day IT security, such as firewalls, Data Loss Prevention (DLP), and Identity Access Management (IAM). When strategizing your organization’s IT security plan, two main areas need to be addressed in order to be prepared in today’s security landscape: risk analysis and end user awareness.

Balancing Risk and Security

Risk analysis is becoming a critical activity as companies decide how to handle corporate data, but only 41% of companies are currently performing this in a formal way. Typical risk analysis includes determining the probability of a risk, estimating the potential impact, and then deciding on mitigation strategies. But, the growing trends of cloud computing and mobility have increased the need for careful risk analysis. Since with public cloud computing and personal smart phones and tablets, data resides outside of your company’s control, companies must re-evaluate which data and systems are the most critical to the business. From there, they must decide which areas need the strongest defenses.

End User Training

CompTIA’s research also reveals that companies are behind the times when it comes to training end users. In today’s consumer-driven IT landscape, it’s more important than ever to invest the time and tools to equip end users with knowledge and responsibility when it comes to protecting company data. Do your employees fully understand your company’s security policy and the importance of acting in the best interest of your organization? If your organization needs help updating your IT security policies, contact your trusted IT advisor today.

The Growing Importance of Mobile Security

According to a report by CompTia, 28% of businesses view security as a significantly higher priority today compared to two years ago, and an even greater percentage of businesses expect the importance of security to rise in the next two years. The study also revealed that while many companies assumed a satisfactory level of security, they did not fully comprehend their exposure to potential security threats. The rise in security threats is largely due to emerging technologies, causing businesses to take a new approach to security. End users now have access to powerful devices and business class systems, often without the oversight of an IT team. Therefore, investing in mobile security is one the smartest things your small to medium sized business can do to protect your organization.

The Human Element to BYOD

According to the study, the factors in security breaches fall 45% to technology error and 55% to human error. With the BYOD (Bring Your Own Device) trend, more and more employees are bringing their own mobile devices to work, and end users typically do not have the background knowledge of security that allows them to recognize potential threats. The desire for productivity and flexibility is driving many businesses to adopt a “use first, secure later” attitude when it comes to mobile security, but this approach puts your business in danger.

Most Common Mobile Security Incidents

Mobility forces businesses to consider data leaving the company in the hands of its employees. The top three reasons for mobile security incidents include: lost/stolen devices, mobile malware, and employees disabling security features. Mobile malware is quickly becoming a growing concern, up 19% from 2012. Since there is a much stronger personal connection to mobile devices, employees are apt to want to use their device however they want to. And, since mobile devices are more closed than laptops, IT departments are not able to place the same safeguards on smartphones and tablets as they are on many other devices.

How to Develop a Mobile Security Plan

The biggest goal with mobile security becomes one of education rather than technical improvement. Companies are quickly realizing that their mobile device security education must be interactive, ongoing, and measurable in order to raise awareness about mobile security. Organizations that have made mobile security education a priority indicate that appropriate and effective training has provided a “relatively high value” or “very high value.” In addition to educating your employees, it’s important to encrypt data on mobile devices, keep OS and apps up to date, and prevent jailbreaking on smartphones. Also make sure that your employees keep passcodes on their devices; while this measure has limited security potential, it at least provides some protection against amateur attackers. If your organization needs guidance learning more about mobile security, contact your trusted IT advisor today.

Technology Outlook for 2015

There are many things on our minds as we enter the New Year. For those of you running a business, a question on the forefront of your mind should be: What can we expect from the world of technology in the coming year? Because technology changes so fast these days, it’s important to be ahead of the game and be ready to adapt to changing times. Here is what to expect from the biggest technology trends in 2015:

Continued Need for Network Security

Mobile applications and mobile search adoption and usage continue to drive the need for network security. Smartphone and tablet shipments are expected to outpace traditional desktops during 2015.  With mobile devices on the rise, businesses need to ensure the security of these devices and prevent business networks from being compromised. Network security, endpoint protection, and other IT Security technologies will be a focus for 2015.

The End of Windows Server Support

Although Server 2003 currently accounts for about 20% of total Windows Server installations, on July 14, 2015, all Windows Server 2003 extended support will end. Therefore, companies transitioning from Windows 2003 in the coming year must be prepared for the move. Due to the end of Windows Server support, many small to medium sized businesses are migrating to the Cloud, which offers backups, better security, regulatory compliance, and the comfort of knowing that your company is always up to date without having to continually invest more time and money. Server migrations require a lot of planning and ample forethought, so make sure to do your research well before July 14.

Cloud Adoption on the Rise in 2015

The International Data Corporation estimates that worldwide spending on hosted private cloud services will exceed $24 billion by 2016. Cloud computing is now an essential ingredient of modern IT, so 2015 will continue to see an increase in businesses shifting their computing infrastructure to the Cloud due to the many benefits, including backups, better security, flexibility, and a simpler way to manage applications and data. Due to the dependence on the Cloud, there will also be a larger focus on Cloud security in 2015: Encryption policies, business continuity and disaster recovery capability, and data protection and data integrity.

Social, Mobile, Analytics, Cloud (aka SMAC)

According to many, we’re moving into a new “digital industrial revolution,” and 2015 will see the more integrated equalizer for small to medium sized businesses through the formula called Social, Mobile, Analytics, Cloud (SMAC) technology. Today’s customers and employees are expecting a new style of commerce that integrates these four elements, which provides the same anytime, anywhere, and any-device convenience they’re familiar with in their personal lives. Among the greatest advantages of SMAC technology for small businesses include the ability to break geographical boundaries, cost effective marketing solutions, and operation enhancement and better data gathering and processing. Most importantly, SMAC technology helps transform small businesses into one with the equal ability to grow its market share within the digital marketing environment.

Do You Have an Effective BYOD Policy?

According to new IDC data, vendors shipped 327.6 million smartphones in the third quarter, an increase of 25.2%, when compared to the same quarter last year. This means that global smartphone shipments have topped 300 million shipments for the second quarter in a row. Although there have been rumors of a slowing market, the data clearly states otherwise. As technology pushes small to medium sized businesses towards smartphones and other mobile devices in the workplace, it is more important than ever to establish an effective BYOD (Bring Your Own Device) policy.

1.     Decide What Mobile Devices Are Allowed

 If your company allows your employees to bring their own devices to work, it can be a nightmare for IT to have to support multiple platforms. Therefore, it is important to decide what devices are allowed to be used for work. Decide whether it is more cost-effective to purchase your own company devices to hand out to employees.

2.     Establish BYOD Security Policies

It is important for your company to establish an “acceptable use policy” for their mobile devices. This will curb employee distractions and reduce risks for harmful viruses and malware. Your company should also develop a monitoring system and disciplinary action for employees who disobey the policy. Although this may seem harsh, it may avoid a security breach down the road.

3.     Employee Exit Policy

In addition to creating an acceptable use policy, it is equally important to come up with an exit policy for when employees leave the company. Document in your employee exit checklist to ensure you remove the employee from access to information on the network, business email, or other applications. If you need help developing an effective BYOD policy for your business, contact your trusted IT advisor today.

Can You Survive a Network Security Attack

Businesses are under constant attack from a variety of network security threats.  Cybercriminals hack databases for passwords for unauthorized access to your network.  Undetected Malicious software (malware) can trap and forward passwords. Viruses can infect your hard drive and destroy application data and files without your knowledge. Businesses large and small face these network security threats on a daily basis; larger organizations, however, may have more resources to fight attacks.  Small businesses may be more vulnerable to downtime and loss of productivity because of thinner margins and resources. Here are a few steps you can take to survive a network security attack.

Prevent Network Security Attacks Before they Occur

Protect your network by making sure all devices are in compliance with the latest anti-virus and malware updates. Ensure your operating system (O/S) patches are up to date. Protect your network with strong passwords and require your employees to change them regularly.  Discourage writing passwords down, and make sure employees are aware of the risks of a network security attack.

Lock Down your Mobile Devices

Mobile devices including smartphones and tablets are particularly vulnerable to theft and loss. Passwords on these devices can be easily cracked leaving your applications and data vulnerable to unauthorized access. Train your employees to report theft or loss of mobile devices quickly, and make sure that all data on the device is encrypted.  Having the ability to track and wipe data from these devices is another option to ensure you can survive a network security threat.

Backup Your Data

Online Backup and Cloud Backup are affordable options to have quick access to applications and data if you lose data because of a network security threat.  Additional options include having a failover system to quickly restore your information and get your business back up and running should you have a systems failure.

Compromising your critical information from unauthorized access, virus infection, and loss can be devastating for any business.  It is likely that small businesses have higher exposure and will have greater difficulty recovering from a network security threat. Contact your network security expert to find out your best options to avoid the consequences of a network security threat.

Mobile Security: Does Your SmartPhone need a Kill Switch?

Many Smartphones and Tablet computers have access to corporate applications and their data through Bring Your Own Device (BYOD) policies and corporate-sponsored mobility strategies.  Mobile Security has become a popular topic for good reason.  According to CIO Insights, mobile data traffic is expected to increase eleven-fold by 2018. Because of increasing data traffic on mobile devices, some government agencies are looking at legislation to require manufacturers to add a smartphone kill switch to remotely wipe a mobile device if it is lost or stolen.

Keeping in mind that a four-digit iPhone passcode could be hacked in minutes, this begs the question:

Does your Smartphone Need a Kill Switch?

Having a smartphone Kill Switch may give a sense of false security.  Adding a kill switch to protect your privacy and corporate information is reactive, rather than proactive.  If not done properly, you could wipe your employees’ irreplaceable information, such as family photos.  A Kill Switch may also make the phone entirely unrecoverable.  This means you will surely need to replace the device once the remote kill switch is invoked.

Proactive Mobile Security

Before you hit the Kill Switch consider proactive mobile-security measures. Smartphones and Tablets are great innovations that allow your employees to stay in touch and work anywhere.  Access to email, operational data, financial information, and customer information through a mobile device can empower your employees and increase their productivity.  Access to this information should be password-protected at all times.  Additionally, any corporate data should be encrypted in transit and at rest. Only approved applications should be allowed on the mobile device and personal data should be stored in a separate “container” from company information.

Beyond Mobile-Device Management

In addition to protecting the information stored on and accessed by a mobile device, you should take the time to train employees on your mobile-security policy.  Your mobile security policies and training should touch on topics such as what is an acceptable use of a Mobile Device in the workplace, why mobile security is important, and how to report a mobile-security incident.

Requiring manufacturers to include a Kill Switch in a mobile device does not go far enough to protect your company information assets.  Having a comprehensive mobile security plan, however, will go further to prevent data loss in the long run.

Mobile Security: Why Should I Care?

Mobile security is top of mind when it comes to concerns for IT Managers.  According to the Computing Technology Industry Association (CompTIA) risk of loss is the number one concern related to Mobile security. For the first time last year, more smart phones and tablets shipped than PC desktops.   It is no surprise that mobile devices are the target of mobile security threats.

Chances are most people in your company have a smartphone, tablet or both.  In some cases these devices connect to your company network using WiFi.  It is equally likely that these devices access company information via email, mobile applications or file synch to company data.  Now that these devices are universal, it is important to have a plan if they are lost or stolen. Keep in mind, your four digit password may be the only thing between an intruder and your data.  Here are some additional considerations for mobile security.

Mobile Security Policy

While you can remotely wipe a Mobile devices when it is lost or stolen, this may not be enough.  That four digit passcode can be easily hacked in minutes.  It is important that employees know how to report a lost or stolen device immediately.  Also consider, there may be personal information on the device that is property of your employee.  This data may not be backed up and could be impossible to recover. There may be local laws that prevent you from wiping this type of data from personal devices.  If your employees access your corporate systems, be sure they sign and acknowledge your company policy for acceptable use, including policy for reporting lost or stolen devices and mobile device policy for storage of personal data on a company owned mobile device.

Mobile Security Training

Some social networks are designed to harvest contact information that may be synched with corporate contacts.  Publishing privacy data without consent may be considered a data breach.  Train your employees on the importance of mobile security policy and the related mobile security risks.

In addition to mobile anti-virus, mobile anti-malware detection, device management, mobile phishing protection, your knowledgeable employees are one of your first lines of defense against the threat of a mobile security breach.  If you feel your employees need training or your mobile security policy is not up to date, contact your mobile security professional today!

Apple Enhances Mobile Security with iPhone 5s

Earlier this week Apple announced their new line up of iPhones.  The iPhone 5c is a new model catering to smartphone users on a budget, while the iPhone 5s is their newest flagship product.  The iPhone 5s features a new fingerprint sensor known as “Touch ID”  designed to provide access to your new iPhone 5s with the touch of a finger versus a four digit passcode.

Mobile Security  Concerns

According to research by the Computing Technology Industry Association (CompTIA) mobile device theft or loss is a top concern among IT professionals and small business owners.  CompTIA research also indicates that requiring a pass code to unlock a mobile device passcode is the most utilized defense according to 76% of those surveyed.  But is a four digit passcode enough?

Apple “Touch ID” improves  Mobile Security

Biometrics are far from perfect however, Apple Touch ID is expected to increase mobile security over a four digit pass code.  Apple’s four digit passcode is limited to 10,000 combinations and can be cracked by an expert in under six minutes.  Because some are concerned that Apple Touch ID stores fingerprints on its’ new A7 processor Apple will continue to provide the four digit pass code option for those who choose not use use Apple Touch ID.

Other Mobile Security Concerns

Through cloud sharing applications, Social Media, Bring Your Own Device (BYOD) adoption and other mobility trends, mobile devices can create a hole in your company’s IT security architecture.  Access to corporate applications and their data, privacy information and commingling of personal and company assets add to the mobile security challenge.  Mobile devices are the target of mobile threats including: malware, viruses and phishing schemes.  Because of the rapid adoption of smartphones, tablets and other mobile devices, mobile security is an important issue for businesses today.

Mitigating Mobile Security Risks

Companies are reaping the improved productivity, connectivity and communications by adopting a mobile device strategy within their business.  To mitigate security risks, it is important to have a mobile device policy and mobile device plan within your company.  This includes mobile lifecycle management, mobile application policies, mobile accepted use policies and mobile security training for your employees.  If you use mobile devices within your company (as most companies do) ensure you are doing so in a secure manner by having your IT service professional review your mobile security practices.