Wireless Security for Devices
Lots of mobile devices are getting stolen... many with sensitive information on them like people's social security numbers, blood types... you know, things that really could wreak some havoc if they fall into the hands of the right diabolical mind. It seems everyone in the news is only talking about the tragedy and aftermath of losing mobile devices like PDAs, laptops and smartphones, but no one wants to talk about the solutions. There are some great companies out there who have real mobile security solutions. My personal favorite is a company called CREDANT Technologies - www.credant.com - they actually have a network administration piece that gives IT people full view of all the mobile devices with access to their networks (no more John Does coming into the office with their latest gadget and stealing company information), and the solution actually gives the administrators control of the devices on their networks. It's pretty cool stuff that is really needed out there in the wild, wild west of mobility.
The part that really peeves me is that no one wants to talk about the solution... it's like they're standing there saying the 'sky is falling' but oblivious to the shelter that could protect them. Anyway... just venting.
OK - even just today, here's all the noise out there about the PROBLEM... again, not the solution, the problem... AGH!
New computer virus causing global chaos
http://www.iol.co.za/index.php?set_id=1&click_id=115&art_id=qw111520620144B251
New computer virus causing headaches here in the Valley and around the worldhttp://www.kesq.com/Global/story.asp?S=3296217&nav=9qrxZPty
Mobile Security: Data goes walkabout (byline by PointSec)http://www.ebcvg.com/articles.php?id=701
Why IT managers should pay attention to cell phone security
http://software.itmanagersjournal.com/software/05/04/29/0235223.shtml?tid=26&tid=46
Fresh Warning for Businesses to Comply with Data Protection Act (Pointsec mentioned)
http://www.securitypark.co.uk/article.asp?articleid=23745&CategoryID=1
So your employer 'lost' your information
http://money.cnn.com/2005/05/03/pf/security_employees/
Destroying old hard drive data is difficult but necessary
http://www.newstarget.com/007343.html
Two-Factor Authentication: The Next Wave in Security? http://www.iseriesnetwork.com/content/f3/index.cfm?fuseaction=news.viewArticle&webID=1001&newsID=5021&issueID=5198&articleID=50860
Patient information not for public discussion
http://www.roanoke.com/editorials/commentary%5C22968.html
0 Comments:
Post a Comment
<< Home