Secure Mobile Device For Enterprise

With the introduction of cool mobile devices available for the corporate world, executives feel their existing blackberry out of fashion. For a while, blackberry devices ruled the corporate world for mobile communications. They are efficient and highly secure.

Blackberry security is still considered the gold standard for enterprise mobile communications. However, with generation Y taking over the corporate world, enterprise infrastructure have a hard time meeting their demand to have social networking and other mobile applications available on their mobile devices. RIM’s product is no more preferred; rather it is now one of the options that should be available to the corporate users.

There is also increasing demand among employees to use their personal mobile devices (individually liable) for enterprise use. They view pervasive wireless LAN (WLAN) and mobile cellular coverage as “must have” capabilities and consider smartphones as “must have” tools that would help integrate their personal and professional lives.

Until recently every enterprise had a web address advertised along with their products. Now, their applications are showing up in mobile device application (app) store and their mobile web addresses (example are advertised along with their web address (example increasing their competitiveness.

So how do we secure such diverse devices while making them available for corporate use?

Continue reading “Secure Mobile Device For Enterprise”

Fraud Using Facebook

Facebook Logo via Wikipedia

Ever found your bank statements on Facebook? How about your health records and business plans? That’s what happened to a friend-of-friend of mine. My friend found her friend’s family pictures, health records, business plans and bank statements on Facebook.

The friend-of-friend engaged me to help her out from this as she had no clue how all these information ended up on a Facebook wall. Apparently the friend-of-friend is a business woman and a millionaire who travels a lot to Asian countries such as Malaysia, Singapore and India.

She recently had to undergo a brain surgery in India for which a lot of information was exchanged to her doctors and friends via Gmail. Information includes her health records and bank statements from Canada. She also used this account to exchange business plans with her partners as well as family pictures with her friends.

Continue reading “Fraud Using Facebook”

Why not Twitter?

My first encounter with social groups is on eGroups, which later became yahoogroups. I would say that was the first well-known social networking media. Then there are forums and websites like Orkut, LinkedIn and Facebook. I use these tools to connect with people and keep in touch. Once in a while I do update them with what I am up to or what is going on in my mind.

However, if I have to advertise everyone of my single moment, that’s like having someone follow me everywhere. I need to have my own privacy. Of course I am a social being, but there is a limit to which I can allow others to interfere with what I do. So far, the value I found in Twitter is to have someone follow me everywhere, which I don’t favor much. It may help an enterprise to advertise their new products or update their users with product updates. However, it may not suitable for an individual who values privacy.

So far, I am happy with other social networking tools. With recent DoS attack, I am just curious about Twitter’s maturity. Can it protect my identity on it?

This is my first blog in August, decompressed after the Burton Group Catalyst conference.