IT security is complicated enough. The widespread adoption of BYOD mobile devices and the overall consumerization of IT promise to complicate security efforts exponentially. Are companies up to the challenge?
News of massive hacking attacks that expose sensitive company data and compromise customer account information has businesses of all sizes taking a closer look at their data security practices.
In the event of an emergency, employees will likely grab smartphones and personal items before evacuating. They are unlikely to rush to find the binder of emergency procedures.
There is a common plot line that underlies most of the breach stories in the news. Software written by bad guys gets into places on the corporate network where it shouldn’t be. It looks around, finds vulnerable systems, grabs valuable data and transmits it off the network. The term most commonly used to describe this behavior is Advanced Persistent Threat (APT).
In today’s era of mega-breaches with thousands to millions of lost customer records or the hacking-of-everything it is safe to assume that the logical security of devices becomes almost more important than the physical protection around those assets.