The mobility domain is critical to assessing risk arising from mobile users of enterprise resources, including laptops and mobile devices, and other hardware covered by policies such as bring your own device (BYOD). In order to protect sensitive intellectual assets, an effective BYOD plan must include formalization of policy and enforcement mechanisms that cover access control, acceptable usage and remote wipe capability in case of loss.
Because the integrity of intellectual assets is at its most vulnerable during transit, a foreign travel security policy should be adopted to protect against the growing sophistication of competitive intelligence adversaries. This includes the adoption of best practices and behaviors during transit, which includes taxicab, airplane and hotel, as well as after arrival at final destination and return.
In light of recent incidents such as the Target breach and the Heartbleed bug, security remains top of mind for IT professionals. While most security solutions address only cyber-based threats, organizations need a more proactive and holistic approach to find, fix and protect potential vulnerabilities and reduce the likelihood of a security incident. In this slideshow, Armond Caglar, senior threat specialist at TSC Advantage, presents the six domains that every organization needs to examine to reduce risk.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>