The Financial Impact of Consumerization – BYOD boosts productivity.

BYOD Financial BenefitsIT strategists and commentators alike have been talking about the cost impacts and benefits of the Consumerization of IT for years. However, no-one seems to agree on what’s actually going on out there from a financial perspective. Why? Because no one has managed to formulate an effective framework for measuring the financial impact of consumer-grade technology on the enterprise. IT managers are effectively flying blind with only a vague notion of what to measure and how to measure it.

Read more of this post

BYOD, Enterprise Mobility and Beyond – What to expect in 2013

BYOD, Enterprise Mobility and Beyond – What to expect in 2013Trend Micro’s CTO Raimund Genes recently published his traditional new year predictions for 2013. Quite insightful and mind opening paper, which I invite you to download and add to your reading list for the Holidays.

Interestingly enough for Trend Micro – the company that has made the “Journey to the Cloud” its corporate mantra – Raimund’s top two predictions are not related to the cloud but rather to the inevitable impact of consumer mobile platforms on corporate IT – a topic particularly relevant to the Consumerization blog and to the Enterprise Mobility professionals among us:

#1 The volume of malicious and high-risk Android apps will hit 1 million in 2013.

#2 Windows 8 offers improved security—but only to consumers.

Read more of this post

The Financial Impact of Consumerization – You can’t manage what you don’t measure

Most Scrutinized BYOD Expense ItemsThe Consumerization of IT is a trend even the most parochial IT manager has surely heard of by now. It’s sweeping through enterprises across the planet with no regard for legacy, tradition or order and can be seen as either the most exciting or terrifying thing to happen to IT in the past decade, depending on where you stand.

For many IT managers, unfortunately, the prevailing attitude is still “why should I allow it?”. They are clinging on to the old paradigm whereby IT controlled and dictated the purchasing and ongoing management of technology used by employees. This attitude just will not stand any longer – consumerization is happening, and it needs to be managed in as financially efficient a manner as possible.

Read more of this post

Legal and technical BYOD pitfalls highlighted at RSA Conference

Companies that don’t protect themselves through policies place themselves at risk.

Post based on my interview* with Mikael Ricknas of Computerworld.

Allowing employees to bring their own devices to work is causing new challenges, including what happens when a device needs to be wiped or employees want to sell their smartphone or tablet.

Mobile security and BYOD (bring your own device) are main themes at the European edition of RSA’s security conference, which takes place this week in London.

Letting employees use their own smartphones or tablets for work represents a loss of control for IT departments. Also, if personal data isn’t handled correctly, the company may end up being sued, said Cesare Garlati, vice president of mobile security at Trend Micro and the moderator of a conference session called “The Dark Side of BYOD“.

Read more of this post

Smartphone Security Winners & Losers

Mobile Security Winners & LosersPost based on my interview with Jeanne Friedman, content manager for  RSA Conference.

In the mobile space the BYOD trend is becoming a minefield for IT administrators. Many companies have experienced a data breach as a result of an employee owned device accessing the corporate network. When the stakes are this high, corporate IT needs to know which platforms to allow and which to refuse.

Android is the most popular mobile platform in the world. It is also the most vulnerable to attack and in fact the most exploited. Contrary to common perception, Apple mobile devices are not immune to security flaws. And in fact less secure than Android if users “jail break” their devices – to escape Apple’s control.

Read more of this post

Advice for BYOD users: don’t be naive about mobile security.

Trend Micro interviews at the Mobile Convention Amsterdam 2012 reveal a shocking lack of education with regard to the security risks posed by mobile devices. Here is what you should know.

We all love our smartphones and tablets. And we all love those little mobile apps that make our devices so unique, useful, and fun. But have you ever thought about how safe they are? Should you trust your smartphone to shop online? Is it safe to access you bank account from your tablet? Is it ok to check your corporate email from your mobile phone? Should you trust the device manufacturer? Should you trust the app developer? Do you need mobile security software – as you know you do for your PC?

Read more of this post

BYOD: A Leap Of Faith For Enterprise Users? What has changed in the past year.

Post based on my remarks at Direction 2012 Conference* in Tokyo – August 7, 2012.

I’ve been talking about Consumerization and BYOD – bring-your-own-device – for quite a while now. What has changed in that past year since my presentation at the CIO Summit in Singapore?

What has changed is that more and more organizations are adopting BYOD. Executives and IT managers are learning about the benefits and the perils of BYOD first-hand.

Trend Micro has been working with industry analysts like Decisive Analytics and Forrester Research to take the pulse of IT decision-makers, to help us understand their challenges and what solutions we can offer. They also give us great insights into the state of the union of BYOD.

Read more of this post

Remote working during the Olympics: any new security risks?

What enterprises need to consider as large numbers of staff prepare to work away from the office.

Video post based on my interview* with Stuart Sumner of Computing – Part 1.

A large proportion of staff are set to work remotely this summer as the Olympic Games disrupt the UK’s transport networks. In a recent video interview, Stuart Sumner of Computing asked me whether remote working during the Olympics will create any new security risk for UK firms. My answer is I don’t think so.

Read more of this post

BYOD Best Practices – Three pitfalls you can’t afford to ignore

In a previous post1I raised three pitfalls that your BYOD program cannot afford to ignore when allowing employees to use their personal devices for work:

– Remote deletion of personal data on an employee-owned device
– Tracking an individual’s location
– Monitoring an employee’s Internet access

Based on my involvement with various BYOD projects2 and my ongoing conversations with many industry experts, here is my recommendation for three best practices that will allow you to strike the delicate balance between employee privacy and corporate liability :

Read more of this post

Mobile Security: iOS Jailbreaks Pose Risks

*** UPDATE 9/1/2015: KeyRaider Compromises 225K (jailbroken) Apple Logins ***

http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/

 

Mobile Security: iOS Jailbreaks Pose RisksJailbreaking is happening in the millions: don’t turn a blind eye.



The latest jailbreak for iOS 6.1, released on 4 February, was downloaded by a whopping 5 million users in the first 48 hours alone, according to the website stats posted by Cyril (a.k.a. pod2g), the developer of the latest hack published on evasi0n.com. During these first two days, the websites served 40 million page views of which a good 50 per cent to 2.5 million unique visitors from the U.S.

Read more of this post