Putting the bulk of computing and storage in the data center has other perks for IT management: It creates a centralized location for software upgrades across an entire organization and puts a layer of network security between users and sensitive data--a lost thin client laptop, for instance, doesn't contain private information, and so doesn't pose a threat of causing a data breach.
Additional network concerns included insufficient bandwidth and data security.
All of this technological progress creates a more flexible work environment and contributes to a healthy work-life balance, but it poses a serious challenge to IT professionals, who face a new set of threats to data and network security.
FORBES: Securing Corporate Data In An Increasingly Mobile World
In June, the Hartford Group released a white paper identifying eight ways small business owners can reduce the likelihood of a data breach, including secure remote access through the deployment of a virtual private network (VPN) and regular review of data security practices.
FORBES: Why Investing In Online Security Makes Sense For Small To Medium-Size Businesses
Issues to consider include ease of deployment, managing backup and data access, support, security, network complexity, device management, operating system diversity, total cost of ownership and integration of various tablet platforms at the application, mobile device management process and system level.
Among the drivers are identity and security, data analysis and personalization, network optimization, contextual services, next generation communications services and monetization.
There are four segments of the security industry: network, end point, data, and users.
By combining public information from social networks and facial-recognition technology, the researchers used a webcam on a college campus to identify people by name, and then by using information from their social-network profiles also predict sensitive personal data, such as hobbies and Social Security numbers.
Verizon Wireless has always taken great strides to protect the security of its customers and its network using sophisticated network intrusion and data analysis tools.
ENGADGET: Verizon intros Mobile Security app for Android, wants to keep you safe
The European Network and Information Security Agency (ENISA) has been working on a framework that sees data protection as a basic human right, a protection that is offered to consumers within a social context.
FORBES: The EU's 'Right To Be Forgotten': What Data Protections Are We Missing in the US?
Unfortunately, people operate on human time scales and are simply incapable of discovering all of the information about a network that changes from hour to hour and turning that data into changes in the configuration of security devices.
All of this means that opening up your company to Facebook access could lead to increased phishing and malware threats, which could further cause data breaches and other more serious forms of security incidents within your corporate network.
Lounging outside near one of the seventeen "data toilet" portapotties that housed the network routers, Andy Muller-Maguhn said the camp reflected a cultural movement concerned with data security, privacy and the free flow of information.
On the other hand, these applications can present security risks, such as an unintended transfer of information and data on the smartphone via the network.
ENGADGET: Panasonic and Red Bend Software announce Android security partnership at MWC
应用推荐