business analyst
46.1K views | +0 today
Follow
business analyst
Your new post is loading...
Your new post is loading...
Rescooped by michel verstrepen from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Les apps infectées se multiplient dans Google Play

Les apps infectées se multiplient dans Google Play | business analyst | Scoop.it


En 2013, plus de 42 000 apps mobiles étaient infectées par des malwares sur la boutique Play et Google en a supprimé moins du quart.



Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

4 BYOD Security Strategies For Small Business - Smb - Security

4 BYOD Security Strategies For Small Business - Smb - Security | business analyst | Scoop.it
Whether or not your company embraces the bring-your-own-device approach, don't ignore the data integrity and retention implications of all the personal smartphones and tablets showing up in the workplace.

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

View from the IT desk: Securing social networking in the workplace

View from the IT desk: Securing social networking in the workplace | business analyst | Scoop.it
In this age of "instant information" is it shortsighted to block social networking sites within an organisation purely because of stories in the press relating to scams, misuse and threats?

 

Is it time for a re-think?

With the increase in the number of organisations embracing Bring Your Own Device (BYOD) this trend is only going to grow.

So perhaps now is the time to look at educating users about the issues, and empowering them to use these tools responsibly, rather than trying to block access; after all, this may turn into a battle you can’t win.

 

So, how do you educate users about social networking sites and the issues around them?

 

- Passwords


Teach users about good password management including password strength (difficult to guess but easy to remember), password security (keep it to yourself) and using different passwords for different sites (a password is only as strong as the weakest system you use it on).


- Scams, clickjacking and fake apps


Teach users how to spot something that is attempting to drive traffic, harvest data or steal identities. If people are aware of what can happen they may be less inclined to click anything-and-everything in the hope of a free gift.

 

- Sensible sharing


Social networking sites can be restricted to allow only a limited number of people to access data and information. If you have a target audience, do you need to tell ‘everyone’ or only those you wish to educate? Teaching people how to amend these settings to protect themselves will help you protect any corporate data you wish to place on there.

 

- Monitoring (for employees)


Social networks send emails relating to access, posts and mentions. Monitoring these will highlight any potential misuse which can be stopped before it gets too severe.

 

- Monitoring (for employers)


Regular checks of internet usage will show any misuse of social networking sites. All employees should be aware you are monitoring internet access and that misuse will be investigated. This should act as a deterrent for anyone who wishes to misuse the privilege and use corporate resources to "check their CityVille..." or "click that link for a free iPad..."

 

Read more:

http://nakedsecurity.sophos.com/2012/08/20/securing-social-networking/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

CITE Conference to tackle BYOD issues

CITE Conference to tackle BYOD issues | business analyst | Scoop.it

Bring-your-own-device policies are forcing companies to confront a myriad of IT challenges related to support architecture, security policies and mobile platforms. Dealing with those challenges is topic No.1


Via Gust MEES
No comment yet.