Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners

While smartphones and tablets have become more ubiquitous in the workplace, organizations are flat out ignoring mobile security risks.

The post Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners appeared first on Security Intelligence.

Continue reading Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners

When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current

The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we’ve got and do our best to educate employees about potential social media attacks.

The post When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current appeared first on Security Intelligence.

Continue reading When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current

As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up?

While most security professionals have come to embrace bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees’ personal devices.

The post As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up? appeared first on Security Intelligence.

Continue reading As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up?

How to Secure Mobile Messaging in Your Enterprise

Two decades ago, AOL’s Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.

The post How to Secure Mobile Messaging in Your Enterprise appeared first on Security Intelligence.

Continue reading How to Secure Mobile Messaging in Your Enterprise

Is Employee Negligence Threatening Your Information Security?

With a little education and a lot of communication, security leaders can steadily reduce employee negligence over time through consistent, comprehensive awareness training.

The post Is Employee Negligence Threatening Your Information Security? appeared first on Security Intelligence.

Continue reading Is Employee Negligence Threatening Your Information Security?

Why You Shouldn’t Overlook Personal Electronic Devices in Your Enterprise Network

When it comes to protecting personal electronic devices, a strong organizational culture of security, from top management to the most junior employees, is imperative.

The post Why You Shouldn’t Overlook Personal Electronic Devices in Your Enterprise Network appeared first on Security Intelligence.

Continue reading Why You Shouldn’t Overlook Personal Electronic Devices in Your Enterprise Network

Making the Case for Containment With WIP

When integrated with a UEM solution by default, Windows Information Protection (WIP) acts as its own container and maintains a native user experience.

The post Making the Case for Containment With WIP appeared first on Security Intelligence.

Continue reading Making the Case for Containment With WIP

Should We Disconnect to Improve IoT Security?

There is no such thing as total IoT security, and the value businesses can gain from the technology outweighs the perceived benefit of disconnecting.

The post Should We Disconnect to Improve IoT Security? appeared first on Security Intelligence.

Continue reading Should We Disconnect to Improve IoT Security?

More Mobile Apps Means More Man-in-the-Middle Attacks

Mobile devices that contain unsanctioned apps are particularly vulnerable to man-in-the-middle attacks, especially when connected to unsecured Wi-Fi.

The post More Mobile Apps Means More Man-in-the-Middle Attacks appeared first on Security Intelligence.

Continue reading More Mobile Apps Means More Man-in-the-Middle Attacks