What is a Cybersecurity Professional?

The proliferation of interconnected network devices across the Internet is a hot topic of conversation in the IT world these days. Everywhere you look, you see references to the Internet of Things, or IoT, as it is called. But a higher level view also reveals a growing basic internetworking of systems and, by extension, people. With business portals and nested company hybrid cloud infrastructures, IT cybersecurity is no longer a “my shop is my shop, your shop is yours” endeavor. The infamous Target breach of 2013 is glaring proof that a business partner’s lack of cybersecurity vigilance can lead to an exposure of your own.

Read more

Reducing the Security Risks Associated with BYOD

BYOD initially started as a trend by employees due to the fact that they are more familiar with their own devices and applications; what’s more, most organizations are behind on technology due to lack of funding or resources. Employees found that the same work could potentially be completed faster and more efficiently by using personal devices instead of the outdated and severely weathered equipment issued by their employer. However, this is more than merely using their own devices; it’s about ease of access and having the ability to work from any location – not just from the office.

Read more

Reducing the Security Risks Associated with BYOD

Bring Your Own Device (BYOD) initially started as a trend by employees due to the fact that they are more familiar with their own devices and applications; what’s more, most organizations are behind on technology due to lack of funding or resources. Employees found that the same work could potentially be completed faster and more efficiently by using personal devices instead of the outdated and severely weathered equipment issued by their employer. However, this is more than merely using their own devices; it’s about ease of access and having the ability to work from any location—not just from the office.

Read more

Bring Your Own Device, Not Your Security Threats

As with all technologies, the biggest security threat emerges from end users’ device management habits. The best security ever devised can fall apart if a user writes their ID and password on the side of a two-factor key and then drops it in the hall. Security can also fall apart if end users visit malicious websites. Sure these threat conditions have existed since the first days of the Internet, but Bring Your Own Device (BYOD) has focused security attention on devices once again.

Read more