Mobile Device Management: The New Frontier in IT Security

Mobile devices have changed the landscape of IT asset management and data security policies. IT managers now have to develop and implement new processes to help to manage, control, and properly dispose of these devices. The biggest hurdle with this is the shifting of power from the IT department to the employees themselves, this introduces a myriad of new risks. Risks such as corporate data available outside of a physical establishment as well as developing strategies for all makes of devices and operating systems.

Does Your Company Have the Same IT Security Lapses as the VA?

Later this month, the inspector general of the U.S. Department of Veterans Affairs will release a security audit that identifies the IT weaknesses of non-classified government agencies, according to Data Breach Today. Surprisingly, the audit confirmed cyberthreats to the VA from both domestic and international hosts.

However, an expert quoted in the article noted that the same lapses uncovered at the VA are also prevalent in the private sector, and blamed a lack of education for failure to commit to basic security measures.

ISO 27001: What Does It Mean & Why is it Important?

ISO 27001: What Does It Mean & Why is it Important? [vc_row][vc_column width=”1/3″][vc_column_text] We’re proud to announce that TechR2 has received ISO 27001 Certification. We’re very excited about this step forward, but what does it all mean? [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_column_text]The International Organization for Standardization (ISO) provides globally recognized management standards to the electronics recycling industry on […]

Data Security Step 1: Don’t let sensitive data walk off

Data Security Step 1: Don’t let sensitive data walk off Do you think most exposure of sensitive data is because of hacking into computer networks? Thousands of patient records and consumer accounts are exposed to the world every month because employees download the information onto portable disk drives, laptops or mobile devices and then lose […]

Cloud Security Alliance identifies new data security risks

Cloud Security Alliance identifies new data security risks The Cloud may be a hole in your data security. As concerns grow regarding how secure your data really is when stored in the Cloud, the industry must react. The Cloud Security Alliance (CSA) has made additions to the guidelines of its Cloud Control Matrix (CCM). This […]

Mobile Device Management in Healthcare

  Mobile devices and bring your own device (BYOD) policies are quickly changing the landscape of healthcare facilities. The number of these devices in facilities is growing rapidly as well as the production and diversity of mobile devices overall. This movement is expected to help curb the cost of healthcare processes (which are steadily rising), […]