tech blog header

IT Security Crucial to Mobile Device Management, says NIST

Posted on Wed, Mar 6, 2013

According to a recent draft of mobile security guidance from the National Institute of Standards and Technology (NIST), businesses should seriously consider the deployment of software that can provide centralized management for mobile devices.  This recommendation appears in "Guidelines for Managing and Securing Mobile Devices in the Enterprise," also known as Revision 1 of NIST Special Publication 800-124.  The draft guidance goes beyond a mere recommendation of such IT solutions; it also provides detailed suggestions that SMBs can use to help them select a centralized management program for mobile devices, as well as guidance with regard to installing and using such a system.

Read More

Tags: Security, Governance, Mobility, Mobile Devices

Is Social Media Destroying Your IT Governance Framework?

Posted on Fri, Feb 1, 2013

As a business or as an individual, you may already have IT governance concerns about the amount of information available online about you. Many of the most high profile hacking cases in the news in recent years have not come about through complex network reconfiguration, but rather through using information freely available online and accessible through social networking.

Read More

Tags: Governance, Data Management, Social Media

Is Network Security Worthless?

Posted on Mon, Aug 27, 2012

In today’s world of free data exchange, it is an interesting thought to be addressed on whether network security really hold the importance as it used to be a few years earlier? But this is of great priority for corporate management and top level management to have a better understanding of the real need for professionally-managed network security.

Read More

Tags: Network Security, Compliance, Governance, Data Management, Network Monitoring

Google Enforces IT Security Policies Due to MP3 Ripping Sites

Posted on Fri, Aug 17, 2012

In previous years, the primary means of obtaining copyrighted music illegally was peer to peer file sharing networks such as Gnutella, KaZaA, Napster, BearShare, WinMX and eDonkey. With the inception of the YouTube video sharing service, which is owned by Google, these peer to peer services have largely fallen into disuse in favor of Adobe Flash-based multimedia sharing services. YouTube gives its enormous user base the ability to upload any video or audio they wish. Though many uses of this technology are legitimate, others reproduce copyright holders' content without permission. This phenomenon has been observed by IT security professionals, record labels and technology journalists worldwide.

Legal authorities at Google have taken notice of a surge in sites that automate the process of stripping the audio content out of YouTube videos, thus resulting in a downloadable MP3 file of a potentially copyrighted song. Two of these sites, and have come under intense scrutiny by IT security professionals at Google. As a result, Google has issued notices to the owners and operators of these two sites requesting that their services be discontinued. However, this does not appear to be motivated by the obvious threat of copyright infringement. Rather, Google claims that these two sites exploit the YouTube API (Application Programming Interface) in a manner that is not permitted by the EULA (End User License Agreement) and Google's privacy policies. Google claims that the activities these sites perform violate the usage rights YouTube visitors agree to by utilizing the service.

Read More

Tags: Security, Cyber Security, Governance

IT Governance and the Fight Against Illegally Shared Content

Posted on Thu, Aug 16, 2012

While the debate about suitable forms of governance for copyright infringement continues to evolve here in the US, European courts are also struggling to find consensus. In the last week, French and German courts have both been considering the role played by file-hosting services and ISPs in the fight against illegally shared content. They have both come to different conclusions.

Read More

Tags: Security, Governance

5 Things About Data Protection a Compliancy Officer Doesn't Know

Posted on Tue, Aug 14, 2012

One of the biggest problems for an officer retained to monitor compliance with data protection law is that, unlike the European Union, there is no overarching government regulation. Instead, the United States takes a piecemeal approach that relies on regulation, self-regulation and legislation written to address specific issues such as the Fair Credit Reporting Act.

Read More

Tags: Compliance, Governance, Data Management

Cloud Computing Strategy Revealed by Department of Defense

Posted on Tue, Aug 14, 2012

The Department of Defense has recently launched their new 4-step cloud computing strategy and appointed the Defense Information Systems Agency (DISA) as the dedicated broker who will oversee all purchases and ensure that the operation is safe, productive, on track and well maintained. Despite the size of the operation and the huge investments that it will call for, the department is looking to take advantage of the new and cutting edge technology developments that will enable them to enhance their cloud storage capabilities. The Department, through the 25 Point Implementation Plan to Reform Federal IT Management, aims to increase their effectiveness, productivity and efficiency and also maintain a workforce of highly skilled IT professionals who will keep the IT cloud storage and other solution up to date.

Public and Private Equanimity

Read More

Tags: Cloud Computing, Governance, Storage

Encryption Helps to Protect Social Security Numbers

Posted on Tue, May 1, 2012

It has come to the attention of information security analysts that the state of Texas had a major security breach earlier this month.  Fortunately, the state's consistent use of encryption technology meant that the worst consequences of such a breach were avoided.

Read More

Tags: Security, Encryption, Governance

Why do I need a Technology Assessment? Find out with this free datasheet.

it support

Follow Us