With users flocking toward mobile platforms, fraudsters will join as well. But businesses have a bigger problem: What to do about employees wanting to use their devices to connect to the corporate network.
Wireless local area network (WLAN) technology was deployed at Mount Allison University to enhance on-the-go productivity of our students, faculty, staff and administrators. Whether it's conducting research, exchanging ideas or gaining access to useful operational information, campus users can now perform such functions in real-time without breaking stride from their daily routines.
Everyone agrees that risk is essential. They just have different versions of what risk is, Evan Schuman reports. It’s time to rethink risk – both how to operationalize it and how to define it. With all the incompatible views of risk from different stakeholders through an enterprise, it’s hardly surprising that so many organizations struggle…
As we are all aware, there has been a rash of reported privacy breaches recently. This likely is because not only is our enterprise data more transient and mobile, but we are having increasing difficulty controlling where that data goes and what controls, if any, go with that data. And that assumes that we actually know where our data is, and who is doing what with it. The sad truth: information security professionals often do not know the location of their enterprises' data.