With the introduction of cool mobile devices available for the corporate world, executives feel their existing blackberry out of fashion. For a while, blackberry devices ruled the corporate world for mobile communications. They are efficient and highly secure.
Blackberry security is still considered the gold standard for enterprise mobile communications. However, with generation Y taking over the corporate world, enterprise infrastructure have a hard time meeting their demand to have social networking and other mobile applications available on their mobile devices. RIM’s product is no more preferred; rather it is now one of the options that should be available to the corporate users.
There is also increasing demand among employees to use their personal mobile devices (individually liable) for enterprise use. They view pervasive wireless LAN (WLAN) and mobile cellular coverage as “must have” capabilities and consider smartphones as “must have” tools that would help integrate their personal and professional lives.
Until recently every enterprise had a web address advertised along with their products. Now, their applications are showing up in mobile device application (app) store and their mobile web addresses (example m.mycompany.com) are advertised along with their web address (example www.mycompany.com) increasing their competitiveness.
So how do we secure such diverse devices while making them available for corporate use?
Continue reading “Secure Mobile Device For Enterprise”
How Stuff Works.com has put up a great tutorial in layman’s language on how VPN work – http://computer.howstuffworks.com/vpn.htm
Have you ever thought about your medical records ending up in USB keys, CDs or DVDs? Well thats what happens when your medical record is subject to a medical research. Information collected on your disease are saved in a repository for understanding trends and behaviours. This include your medical history and type of medication taken.
Some countries do have statutory requirements to protect personal identifiable information, however the custodians of such data does not care where they end. Clinical Researchers and Physicians are not aware of the ramifications due to loss of such information. Often such records are handled by under paid research assistants who are concerned more on the delivery of the end results of their research rather than the security of such records.
Your medical records are stored in-clear in the laptops, USB storage devices and in the email applications such as Gmail, Yahoo Mail and Hotmail -they are not encrypted.
It should be made mandatory on all custodians of such data to encrypt or obfuscate so that the records cannot be traced back to an individual in case they are stolen.
Should I be concerned that someone had already dissected my health information and is operating on it? May be! So much for the great excel application from Microsoft!