TechR2

Mobile Device Management: The New Frontier in IT Security

Mobile devices have changed the landscape of IT asset management and data security policies. IT managers now have to develop and implement new processes to help to manage, control, and properly dispose of these devices. The biggest hurdle with this is the shifting of power from the IT department to the employees themselves, this introduces a myriad of new risks. Risks such as corporate data available outside of a physical establishment as well as developing strategies for all makes of devices and operating systems.

Does Your Company Have the Same IT Security Lapses as the VA?

Later this month, the inspector general of the U.S. Department of Veterans Affairs will release a security audit that identifies the IT weaknesses of non-classified government agencies, according to Data Breach Today. Surprisingly, the audit confirmed cyberthreats to the VA from both domestic and international hosts.

However, an expert quoted in the article noted that the same lapses uncovered at the VA are also prevalent in the private sector, and blamed a lack of education for failure to commit to basic security measures.

Retiring point of sale terminals? Protect your data.

Retiring point of sale terminals? Protect your data. We’ve all been to the grocery store, tried to sign the screen for our credit card purchase, and watched as our careful signature is rendered as an illegible scrawl. In-store credit card terminals and point of sale (POS) terminals don’t last forever. But what happens when they […]

Cloud Security Alliance identifies new data security risks

Cloud Security Alliance identifies new data security risks The Cloud may be a hole in your data security. As concerns grow regarding how secure your data really is when stored in the Cloud, the industry must react. The Cloud Security Alliance (CSA) has made additions to the guidelines of its Cloud Control Matrix (CCM). This […]