Apple Enhances Mobile Security with iPhone 5s

Earlier this week Apple announced their new line up of iPhones.  The iPhone 5c is a new model catering to smartphone users on a budget, while the iPhone 5s is their newest flagship product.  The iPhone 5s features a new fingerprint sensor known as “Touch ID”  designed to provide access to your new iPhone 5s with the touch of a finger versus a four digit passcode. Mobile Security  Concerns According to research by the Computing Technology Industry Association (CompTIA) mobile device theft or loss is a top concern among IT professionals and small business owners.  CompTIA research also indicates that requiring a pass code to unlock a mobile device passcode is the most utilized defense according to 76% of those surveyed.  But is a four digit passcode enough? Apple “Touch ID” improves  Mobile Security Biometrics are far from perfect however, Apple Touch ID is expected to increase mobile security over a four digit pass code.  Apple’s four digit passcode is limited to 10,000 combinations and can be cracked by an expert in under six minutes.  Because some are concerned that Apple Touch ID stores fingerprints on its’ new A7 processor Apple will continue to provide the four digit pass code option for those who choose not use use Apple Touch ID. Other Mobile Security Concerns Through cloud sharing applications, Social Media, Bring Your Own Device (BYOD) adoption and other mobility trends, mobile devices can create a hole in your company’s IT security architecture.  Access to corporate applications and their data, privacy information and commingling of personal and company assets add to the mobile security challenge.  Mobile devices are the...

Are You Ready for Mobility?

Mobility in the workforce is increasing productivity and driving savings for small to medium sized companies. Recent research from the Computer Technology Industry Association (CompTIA) uncovers 73% of small businesses surveyed cite they have a mobile device strategy driven by moderate to heavy focus for Mobility to make employees in the field more productive. Moreover, 58% of respondents have productivity gains for travelling employees as a moderate to heavy focus to include smart phones, tablet PCs and laptop computers in their businesses. Connecting employees with customers was cited as a moderate to heavy focus for driving Mobility strategies by 55% of those surveyed, while 48% cited eCommerce as a moderate to heavy focus in their Mobility strategies. To take full advantage of smart phones, tablet PCs and laptop computers in your company, there are a few precautions to consider when rolling out a mobile solution. Here are a few tips to consider to get the most from your Mobility solution: Check your Mobile Security Policy Some mobile devices may be vulnerable to trojans, malware and phishing schemes. Ensure that your Mobile Solution includes security measures to keep devices connected to your network, corporate applications and data are up to date with mobile anti-virus and mobile-anti malware protection. Passwords aren’t enough to protect your devices, therefore, companies must also encrypt corporate data on mobile devices and be prepared to remotely locate and wipe lost or stolen mobile devices. Check your Network Bandwidth for your Mobility Solution Some mobile applications can put a strain on your companies wireless network. To receive maximum productivity from your employees using mobile devices in the...

New iPad at work? Make sure it is secure.

New iPad at work?  Make sure it is secure. With the holiday season behind us,  as expected, many employees are coming to work with shiny new tablet computers including Android Tablets, Microsoft Windows RT Tablets and the new Apple iPad Mini.   Your company may have a “Bring Your Own Device” mobile device management policy that allows employees to use these devices at work and, in some cases, for work.  Maybe you made that year-end corporate purchase to outfit your staff with the new iPad.  Either way, you need to make sure your corporate network, applications and data stay secure as these mobile devices enter the workplace. Here are a few tips to make sure your mobile device policies are in place, so your employees can use those new iPads securely.   Review your Mobile Device Policy Does your company have a written mobile device policy?  If not, you should put that in place.  The top issues with mobile devices, such as a new iPad, are related to loss or theft.  Because these devices may have access to your corporate applications and data, including email, customer and inventory data, make sure your employees know what is acceptable use for these mobile  devices.  Is it ok to store corporate data on personal devices within your company?  Conversely, can employees store personal data on a corporate owned mobile device?  Either way, have a stated mobile device policy so you can measure compliance with your mobile device policies and procedures.   Proactively Manage Your New iPad You can secure your iPad in case of loss or theft by keeping an audit of the...

Getting More From Your IT in 2013

Getting More From Your IT in 2013 There are plenty of ways to get more from your IT budget in 2013. Mobility, remote support and cloud backup are a few technologies that will make your budget go farther. Let’s explore a few ways you can leverage these emerging trends to get more from your IT infrastructure. Mobility Mobility is a rapidly growing trend. Most analysts agree there will be as many shipments for mobile devices (e.g. smart phones and tablets) as there are for PC desktops, laptops and servers shipped in 2013. With more emphasis on mobility, companies need to address the security issues around lost or stolen devices. Mobile devices may have access to critical business applications or have corporate data resided on the smartphone or tablet. Companies may be subject to data leaks if these mobile assets are lost or stolen. If you have unintended disclosure of privacy information related to employees, customers or suppliers, you may be subject to fines due to breach of industry (e.g. PCI Compliance) or regulatory requirements (e.g. HIPPA). You may also lose goodwill with customers if you suffer a data loss. A data loss could also impact sales. By protecting these mobile devices with a proper mobility strategy, you can avoid the costs associated with a data leak. As they say, “an ounce of prevention is worth a pound of cure”. Remote Support Many companies have turned to remote support models to monitor and manage their network environment. By remotely monitoring and managing your network and related IT assets, your IT Service Provider may be able to fix your IT costs...

Apple to Begin Shipment of iPad Mini Tablets

Apple to Begin Shipment of iPad Mini Tablets Apple Computer announced their newest tablet computer, the Apple iPad Mini  on November 2nd. Expect the Apple iPad Mini with WiFi with Cellular LTE support to begin shipping sometime this week. The Apple iPad Mini joins a variety of choices in tablet computing including Microsoft Windows RT Tablets, Google Android Tablets and the family of Apple iPads. Tablet computers are one of the fastest growing segments of PCs, so it is no surprise there is a wide range of choices. Here are some things you should consider when purchasing a tablet computer for your business. What is the intended business use of the tablet computer? Tablets are great for taking notes during meetings, one on one sales presentations, collecting data in the field, accessing patient information in the examination room and a variety of other tasks where the user is standing or sitting without a desk. Think twice if you expect your tablet to replace a desktop or laptop computer. For example, laptops are great for working on an airplane or taking work home or on the road. Don’t make your decision for a tablet computer as an “either/or” decision. Consider the business requirements the tablet computer will fill. Do I have a policy for handling corporate data on a tablet computer? One consideration when purchasing tablet computers is that they are more vulnerable to theft and/or loss. You should take precautions to ensure you have the ability to wipe corporate data from the device if it is lost or stolen. How will your business back up data from tablets? Employees...
Page 4 of 41234