Bedrijfsvertrouwelijkheid in gedrang door gadgets (EN)

Rachel McShelley

An interesting prediction made by Unisys earlier this week, stresses the potentially threatening combination of man and machine. Describing this combination as a “double-edged sword”, Unisys acknowledges human factors and (lack of) awareness as an “vulnerability in organizations’ network perimeters”. In other words, the “blurring line between work and home in the use of consumer devices” may increasingly lead to breaches.

“The consumerization of IT trend presents a double-edged sword,” said Patricia Titus, chief information security officer at Unisys. “On one hand, ready access to popular devices and technologies gives consumers and employees a level of convenience and productivity they’ve never had before. On the other hand, security officers and professionals now must figure out how to address the new security challenges that arise as hundreds or thousands of these new devices and their associated applications are introduced into the enterprise infrastructure.”

Unisys believes the following security trends will emerge in 2011 as organizations respond to the evolving threat landscape:

1. Increased focus on consumer device security policy
2. Biometric enablement of mobile devices
3. Port worker ID programs
4. Business continuity planning as a defense against cyber attacks
5. Location-based security

Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

One comment on “Bedrijfsvertrouwelijkheid in gedrang door gadgets (EN)”

  1. An interesting prediction made by Unisys earlier this week, stresses the potentially threatening combination of man and machine. Describing this combination as a “double-edged sword”.

REPLY

You must login in order to reply.

Panel's Jotter

Editor Intelink says:(2012-10-02 10:49:19)

“Een kwaliteitsslag voor school, student en stagebedrijf” Het herkennen en correct behandelen van bedrijfsvertrouwelijke informatie. Het programma speelt tevens doeltreffend in op de sterk toenemende behoefte aan Social Media Integriteit van stag...

On: Stagevoorbereiding voor MBO en HBO: Bewustwording Bedrijfsgeheimen & Social Media Integriteit
Danny Lieberman says:(2011-05-09 13:35:04)

As one of the pioneers in DLP - data loss prevention and an active thought leader in the field since 2003 - it is typical for people who discover that the emperor is naked to take knee jerk reactions. IT and HR procedures are part of a set of data...

On: WikiLeaks legt menselijke factor bloot (EN)
Rachel McShelley says:(2011-03-31 10:01:15)

Blijft helaas onduidelijk waarom BitDefender dit opvallend en vooral ook een beveiligingsrisico vindt.

On: Facebook: 42% onbekende online vrienden
View all replies»

Join us on:

  • Facebook
  • LinkedIn
  • RSS
  • Twitter


Panels

Join our Research Panel!
Sign up for: Study into Information Leakage in the Netherlands 2010


Publications

News and analyses on Human Factors & Awareness


Upcoming events

No events