Security

ComputerWorldIndependent

It's time for IT to take control of mobile apps

Credit to Author: Evan Schuman| Date: Tue, 05 Sep 2017 14:13:00 -0700

IT is seeing a very dangerous collision of two trends: BYOD and mobile apps. IT’s job is, among other things, to protect corporate data, a portion of the company’s intellectual property. And yet easily downloaded consumer apps are threatening that data security by sharing their sensitive data with mobile apps that have almost infinite capabilities.

Consider this reference from a scary story courtesy of The Intercept: “When launched for the first time, [popular app Sarahah] immediately harvests and uploads all phone numbers and email addresses in your address book. Although Sarahah does in some cases ask for permission to access contacts, it does not disclose that it uploads such data, nor does it seem to make any functional use of the information.”

To read this article in full or to leave a comment, please click here

Read More
SecurityTrendMicro

Smartphones Under Fire: Why We Need to Keep Our Android Devices Safe

Credit to Author: Michael Miley| Date: Wed, 06 Sep 2017 13:00:13 +0000

If there’s one thing we know about cybercrimnals it’s that where there’s people and money, they will surely follow. With an estimated 1.4 billion Android devices in use today, it’s not hard to see why they might have your smartphone in their sights. Attacks on Android devices made up 81 percent of mobile attacks last…

Read More
ComputerWorldIndependent

Details, details…

Credit to Author: Sharky| Date: Wed, 06 Sep 2017 03:00:00 -0700

Word comes down from on high that this company will be installing video surveillance systems in dozens of its remote warehouses, reports an IT manager pilot fish on the inside.

“The director of operations decided we needed video surveillance in order to monitor the warehouses in real time,” fish says. “The ability to review video at our corporate office was key to the project.

“Then he signed a contract to start installing these systems with a national vendor without first consulting with IT.”

That results in a series of unexpected phone calls to fish from installers, who need him to drop everything and help them by configuring firewalls, providing them with static IP addresses and then trying to test their systems.

To read this article in full or to leave a comment, please click here

Read More