Friday, May 31, 2013

The BYOD Mobile Security Threat Is Real

Computerworld Security: May 31, 2013
===============================================================

The BYOD Mobile Security Threat Is Real

Cloud storage, text messaging, poor accountability and the "Bad Leaver" open the
doors to data breaches in a BYOD environment, says a cyber-crime expert in this
CIO.com interview.
http://cwonline.computerworld.com/t/8601062/823929835/614181/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed Technology~~~~~~~~~~~~~~~~~~~~~

Network Monitoring and Troubleshooting for Dummies

The Network Monitoring and Troubleshooting for Dummies Book introduces you to
common network performance management (NPM) issues and give you a new way of
looking at solving them. This perspective allows you to see your network from
your users' point of view, namely, the services and applications they use and
their experience with them.

http://cwonline.computerworld.com/t/8601062/823929835/614182/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=f15b4fd3

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Google wants software vendors to respond to vulnerabilities within 7 days
http://cwonline.computerworld.com/t/8601062/823929835/614183/0/

2. In Texas, cops will soon need a warrant to search your email
http://cwonline.computerworld.com/t/8601062/823929835/614184/0/

3. Dropbox goes down for more than an hour
http://cwonline.computerworld.com/t/8601062/823929835/614185/0/

4. Mobile phone security no-brainer: Use a device passcode
http://cwonline.computerworld.com/t/8601062/823929835/614186/0/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: LogMeIn~~~~~~~~~~~~~~~~~~~~~

Powerful and secure remote support with LogMeIn Rescue

For companies that want to compete in their industry, improving the customer
experience is a top priority. To do that, having an on-demand remote support
solution is essential. That's why companies around the world choose LogMeIn
Rescue to provide powerful, secure support of any device, anytime, anywhere.

http://cwonline.computerworld.com/t/8601062/823929835/613611/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Google wants software vendors to respond to vulnerabilities within 7 days

Google wants vendors to fix or offer mitigation advice for previously unknown
and actively exploited software vulnerabilities within seven days of their
discovery.
http://cwonline.computerworld.com/t/8601062/823929835/614183/0/

In Texas, cops will soon need a warrant to search your email

Texas is poised to become the first state in the U.S. to require law enforcement
officers to get a search warrant based on probable cause before they access any
electronic communications and customer data stored by a third-party service
provider.
http://cwonline.computerworld.com/t/8601062/823929835/614184/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: EMC Corporation~~~~~~~~~~~~~~~~~~~~~

Storage Resource Management Suite Benefits

The Storage Resource Management Suite provides comprehensive monitoring,
reporting, and analysis for heterogeneous block, file, and virtualized storage
environments. It enables you to visualize applications to storage dependencies,
analyze configurations and capacity growth, and optimize your environment to
improve return on investment.

http://cwonline.computerworld.com/t/8601062/823929835/614187/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=1d98d894

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Dropbox goes down for more than an hour

Dropbox users this morning experienced an outage that lasted more than an hour.
The cloud storage service has yet to explain what happened.
http://cwonline.computerworld.com/t/8601062/823929835/614185/0/

Mobile phone security no-brainer: Use a device passcode

When it comes to smartphone safety, the single most important thing a mobile
phone owner can do is lock the device with a unique, four-digit PIN.
http://cwonline.computerworld.com/t/8601062/823929835/614186/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8601062/823929835/604375/0/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8601062/823929835/598565/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

BYOD has moved beyond smartphones and tablets to PCs. In fact, about 25% of
employees in businesses with more than 10 employees have bought the primary PC
they use for work, meaning companies are buying fewer PCs. Do you think BYOD is
to blame for slack PC sales?

http://cwonline.computerworld.com/t/8601062/823929835/613901/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8601062/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8601062/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8601062/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8601062/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8601062/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NjAxMDYy&x=0f822d65

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8601062/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8601062/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8601062/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:26 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive