The Source Newsletter June 2018

5 mobile threats you should shut down in 2018 used with permission from Tektonika (HP) Mobile devices are now a staple of the workplace, as ubiquitous as open floor plans and videoconferencing. Enabling employees to work from their mobile devices can even boost satisfaction, productivity, creativity, loyalty, and engagement—that’s quite a list of benefits. However, embracing these upsides also requires paying attention to the downside: mobile threats. Given the sheer volume and value of sensitive data on employee devices, mobile security needs to be an IT priority. Every time an employee accesses corporate data from a smartphone, they put the entire network at risk—unless properRead More →

Mobile Threats

used with permission from Tektonika (HP) Mobile devices are now a staple of the workplace, as ubiquitous as open floor plans and videoconferencing. Enabling employees to work from their mobile devices can even boost satisfaction, productivity, creativity, loyalty, and engagement—that’s quite a list of benefits. However, embracing these upsides also requires paying attention to the downside: mobile threats. Given the sheer volume and value of sensitive data on employee devices, mobile security needs to be an IT priority. Every time an employee accesses corporate data from a smartphone, they put the entire network at risk—unless proper security measures are in place. To unlock the fullRead More →

Data Security Breach

used with permission from IBM Big Data & Analytics Hub by Seth Dobrin The 72-hour rule included in the European Union’s General Data Protection Regulation (GDPR) has become a major focus for businesses as they work towards compliance. Article 33 states that breaches must be reported to the regulator within a 72-hour window of an organization becoming aware of it, and to the data subject “without undue delay” after businesses become aware of the breach. What exactly constitutes “undue delay” will become clearer as the GDPR is applied in practice, but the thrust of the regulation is clear. The procedural implications for larger companies canRead More →

PII

We live in a connected world where we must share sensitive, identifying information regularly in exchange for services. If you’re accessing government or medical services, you’ll be sharing your PII (Personally Identifying Information). If you’re shopping, you’re sharing your credit card number. And so on! Safely transferring and storing sensitive data affects us all. How you can you verify that you’re sharing and transferring sensitive data well? Follow these three steps: Verify the recipient. Don’t send to the wrong person! Verify the data. You don’t want to send the wrong data, even if it’s to the right person. Verify the method. Transfer data according toRead More →

Newsletter May 2018

Say ‘I Do’ to Cyber Safety From the Cyber Security Alliance More than ever before, mobile devices are the preferred planning tool for couples preparing to tie the knot. For better or for worse, 92 percent of brides-to-be (and some grooms, too!) are checking off to-do lists virtually via their smartphones. The icing on the cake is that these devices can be used for researching gowns, tuxes and various vendors, sharing announcements, managing registries and honeymoon travel and creating personal websites. With the whirlwind of emotions leading up to your wedding, the National Cyber Security Alliance (NCSA) proposes several tried-and-true tips to help ensure thatRead More →