Bidvert-advert

Stay Update - ICT Security

Enter your email address:

We hate spam as much as you do and we will never sell, barter, or rent your email address to any unauthorized third party.

Most Frequently Used Software


CURL / XPertMailer / AutoBlogger / (Parser - PHP Simple HTML DOM)



venerdì 25 maggio 2012

UNITED KINGDOM leads the way within BYOD but many companies have no method of identifying \'known\' cellular threats

@@@@@ In spite of UK and US companies agreeing that mobile phones pose a substantial threat for their business, a lot of admit they have absolutely no clear way of determining 'known' mobile threats that might be attacking their own system.


@@@@@ Study by Tenable Network Protection found that 93 % of UK companies and 96 % of US companies acknowledged the issue; whilst 63 per cent associated with UK firms possess a defined written plan around bring your own personal device (BYOD) that employees followed, just 22 per cent of american citizens could the exact same.


@@@@@ In regards to cellular security, 60 % of UK and also 55 per cent of yankee respondents said it had been a priority this january; still 35 % of US businesses and 22 % of British companies were not controlling cellular device usage on the network in any way.


@@@@@ The investigation was undertaken in RSA Conference 2012 within San Francisco and also Infosecurity Europe 2012 work ing in london, with one hundred people surveyed each and every occasion.


@@@@@ Ron Avidez, CEO and also CTO at Tenable System Security, stated: “There appears to be the contradictive disconnect involving the perceived mobile risk, and the activities being taken by companies on both sides from the fish pond.


@@@@@ “Despite the united kingdom having a minor step up on ALL OF US firms, with increased employees acknowledging the actual BYOD policies in position, most of the figures stay worrying. Smart gadgets entering the workplace symbolize a combination of chance and threat; therefore organisations must be aware of bigger picture of exactly where information rests and also flows within the system. ”



Nessun commento:

Posta un commento

Comments links could be nofollow free