Verizon: Companies will sacrifice mobile security for profitability, convenience

Credit to Author: Lucas Mearian| Date: Tue, 03 Mar 2020 03:00:00 -0800

Despite an increase in the number of companies hit by mobile attacks that led to compromises, four in 10 businesses sacrificed security to meet profit goals or avoid “cumbersome” security processes, according to Verizon’s third annual Mobile Security Index 2020.

It showed that 43% of organizations sacrificed security. More typical reasons for companies exposing themselves to risk, such as lack of budget and IT expertise, trailed “way behind” things such as expediency (62%), convenience (52%) and  profitability targets (46%). Lack of budget and IT expertise were only cited by 27% and 26% of respondents, respectively.

To read this article in full, please click here

Read more

BlackBerry says its new Digital Workplace eliminates need for VPN, VDI

Credit to Author: Lucas Mearian| Date: Wed, 12 Feb 2020 13:18:00 -0800

BlackBerry has unveiled its Digital Workplace platform, a web portal and workspace for secure online and offline access to corporate on-premise or cloud content,  including Microsoft Office 365 resources.

Digital Workplace, announced last week, integrates a secure browser-based workspace sold by Awingu, a Belgium company that penned a partnership with BlackBerry in 2018. Businesses can access their legacy Windows, Linux, SaaS or internal web apps, desktops and files inside of Awingu’s secure managed browser. Awingu’s unified workspace runs Windows, Linux, web and intranet apps.

To read this article in full, please click here

Read more

Feds may already have found a way to hack into Apple iPhones

Credit to Author: Lucas Mearian| Date: Thu, 16 Jan 2020 14:05:00 -0800

After Apple turned down a request by U.S. Attorney General William Barr this week to unlock two iPhones used by a terrorist suspect in a recent deadly shooting, the FBI appears to already have the tools needed to access the smartphones.

Apple turned down a request from U.S. Attorney General William Barr saying it would  not help unlock two iPhones used by the shooter, 21-year-old Mohammed Saeed Alshamrani. He is believed to have acted alone when he shot and killed three service members and wounded several others at the Naval Air Station in Pensacola, Fla. last month.

To read this article in full, please click here

Read more

Apple refuses latest government iPhone-unlock request

Credit to Author: Lucas Mearian| Date: Tue, 14 Jan 2020 12:30:00 -0800

Apple turned down a request from U.S. Attorney General William Barr this week,  saying it will not help unlock two iPhones used by a terrorist suspect last month in the deadly shooting at the Naval Air Station in Pensacola, Fla.

Barr said the shooter, 21-year-old Mohammed Saeed Alshamrani, acted alone when he shot and killed three service members and wounded several others, including two sheriff’s deputies responding to the attack. Alshamrani, a member of the Saudi Air Force and an aviation student at the base, was shot dead on the scene by police.

To read this article in full, please click here

Read more

Do you really need a Chief Mobility Officer? (Spoiler alert: nope)

Credit to Author: Lucas Mearian| Date: Mon, 04 Nov 2019 03:00:00 -0800

While one in three large enterprises has a chief mobility officer (CMO), according to one survey, that role is now largely duplicative and unnecessary – and creating it can hit a company’s bottom line.

Management consultancy Janco Associates, which lists job descriptions and conducts bi-annual salary surveys, last week updated its description of a Chief Mobility Officer (CMO) to include privacy compliance policies in light of the California Consumer Privacy Act (CaCPA), which goes into effect in January.

“As the use of personal mobile devices, social networking, and compliance requirements expand, organizations are faced with a dilemma. How can they balance privacy compliance mandates like CaCPA with business continuity, security, and operational needs in an ever more complex operating environment?” said Victor Janulaitis, CEO of Janco Associates.

To read this article in full, please click here

Read more

New MacBook Pros at work? Here's how to manage them right

Credit to Author: Ryan Faas| Date: Mon, 30 Jul 2018 02:59:00 -0700

Earlier this month, Apple unveiled its newest generation of MacBook Pros; all feature a significant bump in performance, a redesigned butterfly keyboard, the arrival of “Hey Siri” commands and a second generation of Apple’s T-series chips. The T2 chip works to improve performance and includes a Secure Enclave for encryption operations to secure the laptops and power Apple’s TouchID as well as the Touch Bar. (The T2 chip is already in Apple’s iMac Pro.)

To read this article in full, please click here

(Insider Story)

Read more

Feds move to secure mobile devices with machine learning, biometrics

Credit to Author: Lucas Mearian| Date: Tue, 06 Mar 2018 03:24:00 -0800

Amid the growing use of mobile devices for work by federal employees, U.S. defense and intelligence agencies are fast adopting biometrics and other alternative ways of  computers, smartphones and tablets, according to a new report.

More than 90% of federal agency IT officials in an online survey said their organizations provide secure mobile access for work-issued devices, but less than 20% support workers’ personal devices to access most agency systems. Forty percent of those same officials voiced concern about securing personal devices, according to the online survey of federal government IT and cybersecurity officials.

To read this article in full, please click here

Read more

Mobile app management is being driven by unmanaged devices

Credit to Author: Lucas Mearian| Date: Mon, 12 Feb 2018 03:08:00 -0800

The need to manage applications on unmanaged devices owned by employees or contractors is driving adoption of stand-alone mobile app management (MAM) software and services, according to a new Gartner report.

By 2021, 60% of mobile apps being used in the enterprise will rely on at least one app-level management control, whether on managed or unmanaged devices, Gartner’s Market Guide for Mobile Application Management said.

Unlike MAM tools that are part of a larger enterprise mobility management (EMM) suite, the use of stand-alone MAM licensing offers lower per-user cost and can be attractive for companies only requiring app management, Gartner said. For other firms, EMM provides the advantage of a single console and policy set.

To read this article in full, please click here

Read more