Bedrijfsvertrouwelijkheid in gedrang door gadgets (EN)

The consumerization of IT trend has created vulnerabilities in organizations’ network perimeters. A recent study revealed that tech-savvy information workers are blurring the lines between work and home in their use of consumer devices, and that employers don’t seem to have an accurate understanding of what technologies their employees are using in the workplace.

“The consumerization of IT trend presents a double-edged sword,” said Patricia Titus, chief information security officer at Unisys. “On one hand, ready access to popular devices and technologies gives consumers and employees a level of convenience and productivity they’ve never had before. On the other hand, security officers and professionals now must figure out how to address the new security challenges that arise as hundreds or thousands of these new devices and their associated applications are introduced into the enterprise infrastructure.”

Unisys believes the following security trends will emerge in 2011 as organizations respond to the evolving threat landscape:

1. Increased focus on consumer device security policy
2. Biometric enablement of mobile devices
3. Port worker ID programs
4. Business continuity planning as a defense against cyber attacks
5. Location-based security

Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

REPLY

You must login in order to reply.

Panel's Jotter

Editor Intelink says:(2012-10-02 10:49:19)

“Een kwaliteitsslag voor school, student en stagebedrijf” Het herkennen en correct behandelen van bedrijfsvertrouwelijke informatie. Het programma speelt tevens doeltreffend in op de sterk toenemende behoefte aan Social Media Integriteit van stag...

On: Stagevoorbereiding voor MBO en HBO: Bewustwording Bedrijfsgeheimen & Social Media Integriteit
Danny Lieberman says:(2011-05-09 13:35:04)

As one of the pioneers in DLP - data loss prevention and an active thought leader in the field since 2003 - it is typical for people who discover that the emperor is naked to take knee jerk reactions. IT and HR procedures are part of a set of data...

On: WikiLeaks legt menselijke factor bloot (EN)
Rachel McShelley says:(2011-03-31 10:01:15)

Blijft helaas onduidelijk waarom BitDefender dit opvallend en vooral ook een beveiligingsrisico vindt.

On: Facebook: 42% onbekende online vrienden
View all replies»

Join us on:

  • Facebook
  • LinkedIn
  • RSS
  • Twitter


Panels

Join our Research Panel!
Sign up for: Study into Information Leakage in the Netherlands 2010


Publications

News and analyses on Human Factors & Awareness


Upcoming events

No events