BYOD – Forget the device
Only a short while ago BYOD (Bring Your Own Device) was a buzzword being thrown around in the IT industry as one of the new disruptive technologies. Employees started to bring their own devices, especially mobile devices, to work in order to use these devices for work and to improve their productivity. Email in particular was a popular tool employees wanted to access when they were away from the office. Although this is not a new phenomenon (I’ve been taking my personal laptop into work for a good number of years), mobile devices highlighted this trend. Recently though, employees don’t only want to access their email, but they also want to engage with their corporate software systems to improve their productivity. This is causing a massive additional workload on IT departments where these devices must now form part of the network to enable higher productivity. Read more…
Security 101: Less painfull than identity theft
One of the better commodities that hackers treasure is your authentication details. Your username and passsword is worth a lot in the black market. We all know the basic rules around passwords, having a strong password with numbers and characters, changing it regularly, etc. But what we neglect to do is to have multiple passwords, it is just too difficult to remember. Read more…
Anonymity vs Privacy vs Security
The last couple of months Internet security has been making headlines thanks to a hacker group by the name of Lulzsec. Most prominently are their attacks on Sony which caused the PSN (PlayStation Network) to be offline for a month. The group claims that it is for the laughs and they are doing the world a favour by showing the vulnerabilities that exist in systems. They have a huge following on Twitter (187,000 at last count) and there is a lot of reaction on their exploits, mostly negative though. One thing that they do highlight however is that Internet security is still lacking and more active measures need to be taken.