April 8, 2015
In
Security News
BYOD and cloud are top data breaches and malware risks, survey shows
With the influx of personal devices in the workplace and the unprecedented risk of data breach and malware, tightening IT security at a company can seem like a daunting task. Just how difficult of a task is it?
Source: www.cio.com
The IT world needs a mind shift, in how and what to protect. New architecture and C-level understanding is needed.
Perimeter security with firewalls etc will not be enough, especially when users need to access multiple data sources in parallel over public networks. The data itself, both At Rest and In Transit, needs to be protected with more advanced measures that you and your organization controls, like strong encryption and authentication. And most importantly, as this article concludes, we need to build security in the applications, not just trust the network to handle it.
See on Scoop.it – Mobility for enterprise
The post BYOD and cloud are top data breaches and malware risks, survey shows appeared first on Apptimate.
Source: Apptimate
BYOD and cloud are top data breaches and malware risks, survey shows