5 Mistakes In Your BYOD Policy

By | June 6th, 2017|Uncategorized|

Bring-your-own-device (BYOD) policies are designed to promote flexibility and collaboration for employees, help companies cut hardware and service costs, and are quickly becoming standard in today’s workforce. In fact, over half of U.S. companies recently reported that they allow the use of personal devices for work purposes. While there are many benefits to BYOD, it’s [...]

How Companies Can Stay Secure When Introducing BYOD Policies

By | September 23rd, 2016|Business Security|

Bring your own device (BYOD) policies continue to grow in popularity. Employees and employers alike are enjoying the flexibility of using their own devices for work, so much so that we’re starting to see the workplace itself evolve. While we’ve seen many benefits to these policies (productivity, cost savings), it’s important to note that creating [...]

Cybersecurity Tips for Working Remotely

By | September 16th, 2016|Business Security|

For 3.7 million Americans, waking up and logging onto a computer from the comfort of their home marks the start to their workday. According to Global Workplace Analytics’ 2016 study, 50 percent of the US workforce is now permitted the luxury to partially telework during the workweek. This trend continues to edge toward the norm. [...]

Firewall Chats, S. 2, Ep. 5: Creating a Culture of Cybersecurity at Work

By | April 12th, 2016|Firewall Chats|

This April, the National Cyber Security Alliance is encouraging consumers and business owners to make time for digital spring cleaning. Each week is dedicated to highlighting tips to help secure our most sensitive data. It’s important to make cybersecurity a priority in your personal life, as well as work. Small businesses are frequently targeted by [...]

Mobile Security Infestation: Protecting Yourself and Your Mobile Device

By | July 28th, 2014|Uncategorized|

This guest blog post comes to you from Ivan Serrano, a technology, business and social media writer and infographic specialist from San Jose, California. In his free time, Ivan loves marveling at the wonders of modern technology and gets wound up in his photography in San Francisco. We’re all aware of the dangers of hackers [...]

Your Small Business is Big Business for Cybercriminals

By | June 3rd, 2014|Uncategorized|

This post is part of our cyberSAFE series focusing on SMB financial and reputational risks. You can learn more about the financial and reputational risks SMBs face during every phase of business growth by registering for our upcoming webinar on June 10th at 12 PM CT. This cyberSAFE guest blog post comes to you from [...]

News Recap: 2014 Security Predictions Roundup

By | December 5th, 2013|Uncategorized|

As 2013 quickly comes to a close, the security industry has begun making predictions for coming threats and trends for 2014. Here’s a collection of five recurring 2014 security predictions.1. BYOD will continue to grow – and cause risks – in the workplaceMore and more businesses are adopting “bring your own device” (BYOD) practices and [...]

News Recap: Studies Show that Gen Y May Break Restrictive BYOD Policies

By | November 1st, 2013|Uncategorized|

Fortinet recently surveyed 3,200 “Gen Y” employees ages 21 to 32 about device policies at work, and found that many are willing to break work policies when it comes to accessing personal devices or storing sensitive data on personal cloud storage. Respondents were surveyed on several topics, including the use of mobile devices at work, [...]

News Recap: Ponemon Finds Companies Doing Little to Protect Regulated Data on Mobile Devices

By | June 28th, 2013|Uncategorized|

The Ponemon Institute released this week “The Risk of Regulated Data on Mobile Devices,” a study that focuses on the risks associated with employee access to regulated data, including health and financial information, through a company or personal mobile device. The report revealed nearly half of IT professionals cannot determine whether their companies are yielding [...]

Industry News Recap: BYOD Security a Major Concern for Small Businesses, Hospitals

By | May 9th, 2013|Uncategorized|

In the 2013 BYOD and Mobility Security Report, 70% of respondents cited security as the top criteria for success when implementing bring-your-own-device (BYOD) programs. The report, sponsored by Lumension Security, interviewed 1,650 information security professionals around the world, the majority of which represent organizations between 10 and 99 employees.Nathan Eddy of eWeek reported that security [...]

Load More Posts