SIDEBAR
»
S
I
D
E
B
A
R
«
BYOD (Bring Your Own Device)
Jan 26th, 2015 by aperio

As mobile devices continue to infiltrate organizations, the demand for secure solutions becomes critical. By 2017, the bring-your-own-device (BYOD) and enterprise mobility market is expected to reach upwards of $181 billion. The introduction of these new devices influence the way businesses collaborate, communicate and innovate. In order to maintain their status as a market leader, organizations must stay ahead of the quickly evolving technology trends and develop ways to securely integrate them into day-to-day operations. Here’s a breakdown of a few of the mobile trends that are quickly becoming hot topics for 2014:

Predicting the potential risks of wearable technology

According to research firm Juniper, 2014 is the year that wearable technology goes mainstream. Last year, Google launched its highly anticipated glasses and Samsung rolled out a smart watch, while other big tech players including Apple gear up to introduce a whole new breed of wearable tech. On the horizon: smart contact lenses, LED sweaters that can sense your mood and even fingernails rigged with individual radio frequency identification (RFID) tags, allowing the wearer to perform a variety of tasks normally completed with a card.

A recent Fortinet survey, which was conducted across 20 countries and surveyed 3,200 21-32 year old employees, found that 16 percent of respondents agreed that they would use wearable technologies in work or for work purposes as soon as they become available and 33 percent as soon as their price is affordable. Juniper cautions that privacy will be an ongoing issue with wearable tech, as cameras go everywhere – including the workplace. IT teams will face similar challenges and risks as with mobile devices, the most important of which is protecting corporate data.

Stepping up security with a multi-layered approach

As more business processes are extended to mobile, many organizations are finding uses for both mobile device management (MDM) and containerization, either for different deployments or on the same device. Organizations with highly sensitive proprietary content or in strictly regulated industries may prefer the added security that MDM and containerization on the same device provides. A corporate container deployed on a managed device provides an extra barrier to access corporate content. Users are required to enter both a device-level passcode and a container-level passcode, and administrators have both device-level controls and application-level controls that enable app-to-app collaboration with other managed and secure applications within the container.

This approach also creates a sense of segmentation between work and play for end users, bringing a dual-persona feel to managed devices by isolating corporate content inside a secure container. MDM and containerization are often thought of as mutually exclusive security solutions, but today’s most innovative organizations are taking a layered approach to security by using the two in conjunction.

Adopting app scanning to protect organizations and end-users

As employees increasingly demand more apps for business, IT administrators must block malicious applications and certify that internal and third-party applications meet their organization’s security standards. Administrators need to protect organizations from publicly available malicious applications, risks that come with internal and third-party apps, and address concerns around apps accessing personal data on employee-owned devices. In order to address these concerns, organizations must integrate app scanning into their business platform.

With app scanning, IT administrators can identify common app risks, such as access to privacy settings, insecure network connections, malicious code and more. By scanning the applications, administrators can identify potential privacy, behavior, and design and programming risks. This information gives IT administrators the ability to assess whether an application is safe for business use or blacklist the application if it does not meet the minimum security standard, empowering them to take action and eliminate current and future risks.

When it comes to adopting any new technology, the less time organizations spend worrying about security, the more they can focus on driving core business strategies. Therefore, understanding technology trends and predicting their impact is vital to any organization’s mobility strategy.

How To Get The Most Out of Small Business Security On A Shoestring Budget
Jan 23rd, 2015 by aperio

Those of you with IT security responsibilities in small businesses often resemble the stereotypical Scotsman, trying to stretch a penny as far as humanly possible. With an IT security budget that is likelier tighter than a Tom Brady spiral pass, how do you make effective use of your limited spending capabilities?

Small business security teams have to deal not only with limited budgets but resources are equally scarce. Prioritizing your security controls and needs based on risk is the obvious starting point. However, you don’t have the manpower to perform the risk assessments and gap analyses. Given these constraints where does someone even start?

Arguably, one of the best resources that security teams should utilize is the SANS Top 20 critical controls. SANS has done all the heavy lifting in identifying an extensive list of the foundational security controls. This is wonderfully laid out document that greatly helps in laying out implementation road map and how to best integrate the controls into your security infrastructure. SANS has done all the work for you – in describing in great details what each control accomplishes, all you need to do is best identify what controls are would address your most pressing security concerns.

It is actually quite amazing the level of detail that SANS went to in describing how to implement the controls, automate them, how to measure their effectiveness (metrics), how to validate, as well as a process for implementation.

Each control is broken down into sub-controls that can be implemented over multiple phases following a natural progression. The sub-controls are classified as quick wins (can be implemented fast and cheap), visibility/attribution, configuration/hygiene (basic security measures), and advanced. Based on your needs your can progress to the advanced stage of the different controls. This is a great way to form the foundational aspects of the control and then over the years to naturally evolve the capabilities.

How can one effectively manage and visualize what controls (and sub-controls) you have implemented and what areas still need addressing. There is an awesome interactive Excel worksheet from Tech-Wreck blog that makes tracking your progress with the SANS Top 20 an absolute breeze (plus it used graphs that you can give to management so they can easily see the status of the different controls.)

The SANS Top 20 security controls list coupled with the Excel spreadsheets that capture the progress make a formidable tool for ensuring that you can stretch your security dollars and spend wisely on the controls that will best address the information risk within your organization. Try it out, good or bad, I’d like to hear about your experiences.

Photo Source: Leonardo Rizzi
Article By: Dominic Vogel

Office 365 combined with cloud storage and mobile tools can save millions
Jan 19th, 2015 by aperio

On Wednesday, Mecklenburg County, North Carolina’s most populous county, announced it has bet big on the Microsoft platform by selecting Microsoft Office 365 as its communications and collaboration platform, Windows Azure as its cloud storage solution, and Microsoft Surface Pro for its mobility needs.

Together, the seamless mobility, productivity and flexibility aspects of these solutions have already helped various departments within the county collaborate better with staff, integrate across a number of crucial systems, and streamline and improve daily responsibilities. For instance, the county’s Youth and Family Services department is reporting $3.2 million in productivity savings per year due to Mecklenburg’s Surface Pro pilot launch. Meanwhile, by switching to Windows Azure, the county’s cloud storage costs have reduced dramatically.

“With the mobility factor of Surface Pro and Office 365, we are able to do so much more,” said Cliff DuPuy, technical services director at Mecklenburg County. “Not only do our Youth and Family Services folks love the devices for the flexibility and productivity the combination provides to them, but they appreciate the toughness of the devices, the touch aspects and the ability to document benefits while they are visiting clients. We are working toward ensuring that all our employees have their own device, and we can’t keep up with the demand we’re receiving from excited workers. It really has helped to increase their enthusiasm around how they do their jobs.”

Just as important, the county’s technical services director, Cliff Dupuy, acknowledged that these modern devices and services have increased employee productivity and excitement. In addition, the investment in Microsoft technology enables the county to reap all the benefits of the cloud while maintaining its commitment to privacy and security.

In addition to the Department of Youth and Family Services, a number of other departments within the county have recognized the value and mobility benefits provided by the Surface devices when combined with Office 365 and custom-built apps specific to each line of business. For example, the county’s Food Services Department has used these solutions to ensure Food and Restaurant Inspectors can utilize state applications, while the county’s Medical Examiners are benefitting from the note-taking abilities with their tablets. Meanwhile, Mecklenburg County’s Parks and Recreation employees, all of whom are moving to Surface 2 devices, are using these solutions to help them collect payments, book venues easily and tie seamlessly into the county’s financial system. In addition, due to an overwhelming demand for more devices, the county will increase the number of Surface Pro devices it is using to more than 1,000 by Aug. 1, 2014.

With 1.6 million emails sent per day by county employees, the cloud storage that Office 365 provides and the ability for employees to use Office on up to five devices has proved beneficial to all levels of employees within the organization. The emphasis on privacy and security in the cloud was a driving factor for the county to select the Microsoft solution. Similarly, the ability to use Surface Pro tablets with Office 365 has been a killer combination for the county: The Youth and Family Services Department is reporting $3.2 million in productivity savings per year after participating in the county’s Surface Pro pilot launch.

Selecting Windows Azure for its cloud storage was a natural fit for the county — its interoperation with Office 365 and Surface makes the user experience seamless. In addition, with key disaster recovery capabilities, Windows Azure makes more sense from a planning perspective, but also from a cost savings point of view. For instance, the county can ramp up quickly and take significant workloads out of its local datacenters, saving significant dollars.

“The cost savings with Windows Azure are tremendous,” DuPuy said. “Our storage costs used to be $21 per GB; now, with Windows Azure, we are around 30 cents per GB.”

“Mecklenburg County is leading the way in harnessing the power of the cloud and new mobile device form factors to deliver better government services to citizens, while at the same time lowering costs,” said Michael Donlan, vice president of Microsoft’s State and Local Government business. “Whether it’s field inspection, delivering better services to youth and families, or making it easier for business and citizens to enjoy the county’s parks and venues, Mecklenburg is using Office 365, Windows Azure and Surface to transform the business of government all within a solution that best meets their requirements for security and privacy.”

Across the board, county employees have embraced the switch to the cloud, and they have been vocal in their support.

“We have people telling us on a consistent basis that these mobile and flexible solutions, tightly tied together, have collectively changed their working lives,” DuPuy said. “Whether they have used these tools in the past, or they are just learning the breadth of Microsoft’s capabilities, we’ve consistently heard that our teams are really enjoying the new lease on productivity and efficiencies that they now have. That’s really humbling for us IT folks.”

Across the nation, state and local governments are constantly pressured to deliver more services with fewer resources. They are tasked with finding and investing in modern and secure solutions that help them save time and money, while ensuring employees can use these tools in the office and on the go. With Microsoft’s suite of solutions, Mecklenburg County is helping address these challenges.

Who Left Their Charger At Work Today?
Jan 16th, 2015 by aperio

This very unsuspecting phone charger is actually a Spy Device that was built to sniff out all the keystrokes off your wireless keyboard.  Yes this little tricky fake charger is known as a Key Sweeper and its whole purpose is to find out your private personal information like email, password, social security and credit card numbers.  Obviously the list can go on and on when put in the hands of a maleficent being.  Currently it can only be used on Microsoft Wireless keyboard that specifically use 2.4 ghz.

This charger lights up if you plug a usb device into it and it will charge whatever usb device you’ve plugged into it.  However, if you unplug the charger from the wall it is still capable of recording keystrokes.  That’s because inside of the wall unit is a rechargeable battery.  It will record every single keystroke on a memory card inside the charger or for a little extra money it will actually send alerted phrases via SMS or text messages to wherever in the world.

This sophisticated type of invention could be used to potentially cause high levels of chaos in this new age of technology so its best to properly educated yourself and be more aware of the situations, people and objects around you.  Keep that in mind next time you see a lonely charger or someone walking around with an old school pager

Is Your’ Internet Connection or Wireless Network Letting You Down?
Jan 12th, 2015 by aperio

My business relies on the Internet; my phone is an IP phone, it uses the Internet. If the Internet goes down so does most of my business until it comes back up in maybe hours or days. It doesn’t stop there though because even my TV uses the Internet these days and then there’s all those cloud services which means some of my data may not be on any of my computers. I’m running a cable Internet connection and it’s pretty fast especially when it comes to downloads. The faster the broadband the more we can do with it and the more we rely on it. And… it doesn’t even stop there either! Laptops, mobile phones, tablets, TV’s, set top boxes, NAS drives, stereo systems, cameras etc. use wireless so wireless is really important too.

If you are running an Internet dependent business or would really miss your Internet connection at home you won’t want it to go down ever! Well, maybe when you are on holiday… uh oh, got a remote security camera linked to your phone through the Internet or some other device, maybe a remote Internet linked pet feeder or something.

I think most of us want reliable all the 9’s uptime for our Internet but of course that’s not always easy to achieve. Making it 100% reliable I cannot promise in fact even all the 9’s is not that easy but I can probably show you how to make your Internet faster, have a higher capacity, make it more reliable and improve your wireless whilst keeping costs reasonable!

A Common Problem

Most homes and small businesses have 1 Internet connection, 1 line and 1 router that functions as a router a switch and a wireless access point… true? If any of those elements go down then so might your Internet access. You could go ask the neighbour if you could sling a wire through to your business from their supply or ask for their wireless password and maybe sometimes this is OK, it’s a temporary solution of a sort. If you want to be self-reliant though you’ll probably need a better solution.

What happens if…

Your router fails

Simple, go get another router, configure it up (hope you know where your broadband login details are) or better still, have another router on standby, just in case! From my experience most people or businesses don’t have a spare. Your current router might be a bit special but anything will do to get you back up and running if a direct replacement is not to hand.

Your Internet connection fails

It could be your ISP, a fault on the line or a JCB digging outside. Either way it’s down to the service level agreements of your provider. You’ll probably be down for a few hours, maybe a few days and if you are really unlucky, a few weeks, it happens, especially if the road needs digging up.

Flaky Wireless

Wireless has come a long way but it’s still a flaky service. It depends on lots of things, how many people are already connected, what’s in your building, atmospheric conditions, the type of wireless network you have and the capabilities of the devices you are trying to connect to it etc.

It’s also not so great when you have more than 1 wireless access point but your device stays connected to the access point you were near 2 minutes ago and which is now nearly out of range. You could be standing next to another access point on the same network but still not connect to it unless you manually do so.

Does all or some of this sound familiar?

A Solution

There are very fast Internet connections with high up-times and excellent service level agreements that mean if your Internet connection does go down it gets fixed quickly but of course that can cost a lot of money and a JCB going through the cable is probably going to scupper even that plan for a while. There’s WiMax, line of site links and even satellite connections but, well, it’s a bit expensive and maybe a bit over the top for many.

My suggested solution below is not new but it has improved over time and costs less than it used to. Not all brands and/or models will let you do this but the right devices are readily available and affordable.

More than 1

Broadband is pretty cheap so how about 2 supplies over different networks so that if it’s the ISP or just 1line that fails then the other is likely to continue to work. Just to make it belt and braces how about feeding in a mobile broadband supply just in case that clumsy JCB comes your way and cuts all the cables to your premises (don’t laugh, this happened to a company I worked for).

In this case you should have 2 broadband feeds going into the same router which will balance all your Internet traffic using the 2 services giving you more speed and capacity. If 1broadband service fails then the other carries on until the failed service comes back up. If both services fail then the mobile broadband cuts in.

The mobile broadband does depend on the mobile signal you can get where your router is located and whether it’s 3G or 4G but at least it will let you access the Internet. If it’s 4G this could be pretty good! You will need to watch your mobile broadband use depending on the tariff you are using but at least you are still up and running.

What if the router fails? Well of course this can happen so for the cost of it I would keep a second router as a backup. You can backup the configuration of the router in use and load it onto the second router. You can backup the configuration each time you change it and either load it onto the second router or at least have it ready. For some devices, there are extended warranties available where they will replace your failed device the next working day with no quibbling. You could even use the second router as a second modem if you configure it correctly but that’s a subject for another day.

Improving Wireless Connectivity

Wireless or WiFi has improved over time. The range is greater, it’s more reliable and easier to connect to than it used to be but it’s still a variable and sometimes quirky technology. If you need a consistent service over a defined area then you’ll probably need to overdo it with wireless coverage.

Many routers are not just routers; they are routers, switches, modems and wireless access points. The wireless part of your main router will provide all you need in a small space but as an operating space gets bigger you will need further wireless access points to cover the area. Wireless access points can be obtained for both indoor and outdoor environments and can work well in a campus environment.

Two Variants

There are two main variants which we can call push and pull systems. To use a couple of techy terms, the wireless system we’ll call the server and your mobile phone, laptop tablet or other wireless device the client.

Pull

Most domestic or small office wireless systems are pull systems which means you manually connect your client device to a wireless server. For example, an office or house has 2 access points, 1is a wireless router downstairs and the other is a wireless access point upstairs. When your client device is connected to the downstairs router (the server) it stays connected to it until it goes out of range so if you walk upstairs you may need to manually disconnect from the downstairs router and connect to the upstairs wireless access point. It works but it’s clunky and moving smoothly from 1wireless zone to another does not occur. Both wireless access points are part of the same system but the connection to them isn’t managed automatically. You could say that you have to pull connections.

Push

Using the same scenario now the wireless system is being managed and pushing connections. The effect is that when you walk up the stairs the wireless management software built into the system monitors it’s connections and as the signal from 1wireless access point becomes weaker and another stronger it pushes connection to the stronger wireless access point to your client device such as your phone.

Another great thing about Managed Wireless is that it will share the load so if several devices are in range of more than 1access point those access points can be made to share the wireless traffic instead of 1being overloaded and the other hardly used.

Now you can walk up and down stairs with your client device and stay connected without having to think about it. Where two or more access points are located to manage a lot of wireless traffic they can look after the traffic loads so the user gets a good solid wireless service throughout the operating area.

Sounds Expensive

Managed Wireless used to be expensive but it’s not now. It does cost more than pull wireless but not much more and is well within credible cost for domestic or small business users. If you need it it’s well worth the modest extra cost.

You will need routers and wireless access points that can all function as part of a Managed Wireless system and you will need 2 x broadband supplies which can be a mixture of ADSL max, ADSL2+, Fibre known as FTTC or some other suitable broadband/Ethernet supply. You can use cable broadband. 2 lines carrying BT like broadband will give you 2 lines of voice as well.

 

Article Source: http://EzineArticles.com/8851919

Photo Source: http://pixabay.com/en/users/stux-12364/

SIDEBAR
»
S
I
D
E
B
A
R
«
»  Substance:WordPress   »  Style:Ahren Ahimsa