byod


26 Connected Devices Per Human by 2020 Changes the Security Equation: How to Make Sure Your Network is Prepared We seem to be hearing about the Internet of Things (IOT) and the security challenges related to it everywhere these days… While there is no denying that IP-based connectivity continues to become more and more pervasive, this is not a fundamentally new thing. What is new is that the target audience is changing and connectivity is becoming much more personal. Connectivity is no longer limited to high -nd technology consumers... [Read More]
by RSS Ken McAlpine  |  Oct 04, 2016  |  Filed in: Industry Trends & News
Introducing the Fortinet Security Fabric Networks are currently undergoing dramatic change. Organizations are simultaneously wrestling with issues such as BYOD, IoT, virtualization, SDN, cloud, the proliferation of applications, Big Data, and the expectations of the next generation of employees to blend their work and their personal lives on a single device of their choosing, with instant access to any data, at any time, from any location. This has exponentially increased the attack surface that organizations need to be concerned with. For... [Read More]
by RSS John Maddison  |  Apr 25, 2016  |  Filed in: Industry Trends & News
Creating secure environments where we can conduct business safely, protect our customers, and create value that others can’t easily steal requires real determination to do things differently. We’ve seen plenty of organizations with large investments in security hardware and dedicated security teams suffer massive compromises. Real cybersecurity, however, involves a cultural shift at all levels of an organization that puts security first. It’s the second week of National Cyber Security Awareness month. Last week we talked... [Read More]
by RSS Chris Dawson  |  Oct 05, 2015  |  Filed in: Industry Trends & News
I've kept more than my share of legacy systems alive over the years. Sometimes they've running applications that aren't compatible with newer operating systems. More often, there simply isn't the time or money to deal with an upgrade. But with the end of support for Microsoft Server 2003 coming and going this week, I can't help but wonder at the sheer number of businesses still running the OS or what appears to be a general sense of apathy over its end of life.     As Fahmida Rashid over at PCMag put it, "...Windows... [Read More]
by RSS Chris Dawson  |  Jul 17, 2015  |  Filed in: Industry Trends & News
Organizations often allow the use of social media on their networks, but RSAC is buzzing about the risks. Does your organization allow employees to access social media at the office? Many do, whether for strictly personal use, communication, collaboration, or marketing. There is a fair body of both anecdotal and research-based evidence that suggests opening up social channels at work keeps employees happier and more productive. Frankly, with the ubiquity of smartphones, employees are using social networks whether your policies prevent it or not. Employer... [Read More]
by RSS Chris Dawson  |  Apr 27, 2015  |  Filed in: Industry Trends & News
K12 has its share of security and regulatory challenges, but higher ed takes things to a whole new level. Last week I wrote about some of the security challenges K12 schools face, most of which revolve around balancing regulatory requirements, Internet safety, and access to educational resources. I called this the “Ed Tech Conundrum” since giving students and teachers broader access to Internet resources often runs counter to parental, administrative, and regulatory concerns. In higher education, though, we’re dealing with adult students,... [Read More]
by RSS Chris Dawson  |  Dec 10, 2014  |  Filed in: Industry Trends & News
Even for companies that don’t normally allow users to work from home, the holidays practically beg for remote work...and plenty of security threats. Earlier this week, Fortinet published a blog and infographic on ways to secure your holiday shopping. Black Friday and Cyber Monday are nearly upon us, after all, and if 2014 has taught us nothing else, it’s that retailers are vulnerable to attacks and data breaches. But holiday security concerns aren’t just about consumers, credit cards, and spending money on dodgy websites. How many of us... [Read More]
by RSS Chris Dawson  |  Nov 27, 2014  |  Filed in: Industry Trends & News
As increasing numbers of employees work from home, organizations often overlook the security needs of remote workers. Telework predates the BYOD phenomenon by decades. Despite Yahoo!’s move to the contrary, many organizations are shrinking their office spaces and expanding their employees’ ability to work from home. Employees value the flexibility and the lack of a commute, while employers value lower operating costs and workers who happily blur the line between home and professional life, working extended hours long after they might have left... [Read More]
by RSS Chris Dawson  |  Nov 05, 2014  |  Filed in: Industry Trends & News
All one has to do is take a look at the latest headlines to know that Distributed Denial of Service (DDoS) attacks are becoming increasingly commonplace in the enterprise environment. But that doesn't make them any less of a threat. In fact, quite the opposite. These days, powerful DDoS attacks have the ability to shut down dozens of servers, causing hours of lost service time, while damaging brands and costing victim companies millions in lost revenues. And many of these attacks now come equipped with stealth capabilities that can easily dodge... [Read More]
by RSS Stefanie Hoffman  |  Apr 10, 2014  |  Filed in: Security 101
In a recent post we explored the Myths about DDoS. Despite their infamy, many misconceptions surround the world of DDoS but now that you know the facts let's go one step further. Typical internet security appliances come prepackaged with signatures and rules that help identify attacks as simple as they come. This works in many cases but does not make any distinction between the attack traffic and legitimate users who are just trying to view your website. There is also the ever looming threat of zero-day attacks that signature based approaches are... [Read More]
by RSS Hemant Jain  |  Mar 21, 2014  |  Filed in: Security 101