SORT BY Relevancy
This week we'll discuss data security with John Martin and the team from First Watch Technologies!
John will share best practices in keeping your brand and business safe from data breaches and other technology threats. Join us Wednesday at 8pm ET!
Our conversations are real and can take twists and turns resulting in perspective about Big Data you will never get from those ladder climbing professionals playing it safe. It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.
Joining us will be Randy Roberts, President of Digital Security Advisors. DSA provides expertise to understand, design and implement controls needed to provide a secure network. With global enterprise experience our team can help your organization design or redesign your network so that it actively assist your team secure your assets. We discuss Sony, Home Depot and JP Morgan Chase data breaches.
Connect with Randy: www.linkedin.com/in/rsroberts
A Smarter Approach to Mobile Device Management
More people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime.
Needless to say, many small-to-medium sized business owners have embraced the BYOD (Bring-Your-Own-Device) revolution. The benefits are obvious; increased employee productivity, enhanced services to customers/clients, and better overall customer and employee satisfaction.
But what about the potential consequences associated with this mobility revolution? Are small business owners doing enough preemptive planning to address potential risks that could arise with the use of BYOD devices?
4 Essential Pieces to Any Small Business BYOD Strategy
Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.
We’ve come a long way. Today, businesses really have no choice but to let employees use personal devices for work purposes. Blurred lines now make it difficult to differentiate between what is professional and what is personal. A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.
Naturally, security and privacy issues are a concern since these devices synch to the company network. Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to but smaller businesses have limited resources.
Why SMBs Must Proactively Address the Threat of Mobile Hacks
More cyber criminals are targeting small-to-medium sized businesses. One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place. Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate the security vulnerabilities linked to mobile devices like smartphones and tablets.
This is a real cause for concern since data breaches have the ability to put many already financially challenged SMBs out of business.
If customer/client data has been breached, there could be potential litigation costs, and naturally, lost goodwill and an irreparable hit to brand or company reputation. In part 2, we will discuss why this is a must!
3 Things to Consider Before Jumping Into BYOD
You’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it. Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider.
In July 2010, Microsoft transitioned from providing mainstream support for Windows Server 2003 to releasing critical patches only. July 14, 2015 marks another transition, this time the end of Microsoft support for Windows Server 2003/R2.
While this date may seem distant, now is the time to understand that the end of support and the end of life of Windows Server 2003 means that your business needs to ensure that it has a plan to migrate the applications and workloads currently relying on Windows Server 2003 onto Windows Server 2012 R2 or Microsoft Azure.
Just to be clear, End-of-Support for Windows Server 2003 means:
NO UPDATES Will be developed or released after the end of support
NO COMPLIANCE (HIPAA, PCI, SOX, etc.) which speaks for itself
NO SAFE HAVEN as both physical & virtualized environments affected
If you're still using Windows Server 2003, you to start your planning to migrate off of Windows Server 2003 and onto a platform that will provide you the security and reliability that you’ve experienced over the last decade with Windows Server 2003, with the added value of the features now included in Windows Server 2012 R2, as well as the hybrid opportunities available to you with Microsoft Azure.
Delaying will only create additional expenses, and ‘rigging’ your environments to detect intrusion, inclusion of more advanced firewalls, network segmentation, and so on, to simply isolate Windows Server 2003 servers will only result in a datacenter that costs more, and is still out of compliance, and out of date. Not to mention the maintenance costs for aging hardware… you’re just delaying your opportunity to transform.
If You Plan To Stay With Microsoft What Should You Do Now? We'll discuss that in this series.
Remember… Always Practice Safe BYOD
No matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement.
We live in an exciting time when work can be done at any time from any place. Employees love the fact that they can get work done on their iPad as they sit poolside sipping a Pina Colada. Businesses love the cost savings along with the happier and more productive employees they’re noticing. Meanwhile, customers and clients take note that their emails are commonly answered outside traditional work hours with a “Sent from my iPhone” tagline at the bottom.
Like anything related to business technology, there are naysayers who are quick to warn that a more mobile and dispersed workforce also means increased security risks.
Do they have a point? I'll cover that today!
Part 1: The Good, The Bad, and the Ugly of Mobility and BYOD
There are a lot of advantages to mobility in today’s workforce, but the Bring-Your-Own-Device (BYOD) movement has also brought its share of headaches as well.
We live in a society where everyone must have the newest technology. We are inundated with ads reminding us that the smartphone or tablet we just bought a year ago is laughably outdated and inferior to the upgrade that just hit the market.
People who have just bought the latest technology don’t want to have to set it aside to use a separate company-issued device. As a result, businesses are beginning to grant these employee-owned devices access to their file and email servers, databases, and applications.
While this brings certain competitive advantages to employers, it naturally carries many risks, too.
Stan Jamrog stops by for another episode on Security issues and solutions in America. Is security really as important as I'm making it out to be? YES, an emphatic YES! There is a lot of evil out there trying to thwart America's standards of freedom. America must protect freedom at all costs due to the deaths of the people who fought for it in the past! So, come listen to a great show on security just in case you need to know how to protect enen yourselves from Tyranny!
Join Host Live Chats
- John Baptist (88 chatters)
- AnaMRueda (38 chatters)
- Talk Real Solutions (34 chatters)
- thelordshour (22 chatters)
- HOV Radio (15 chatters)
- Pine Ridge Warriors (12 chatters)
- Psychic Teachers (12 chatters)
- BeverlyD (12 chatters)
- Angels Of Light (9 chatters)
- Rich Wilson (9 chatters)
- Witch School (7 chatters)
- Libertys Thunder (6 chatters)
- Know Thyself Radio Network (5 chatters)
- Gecko Nation Radio (5 chatters)
- Dead Air Paranormal Radio (4 chatters)
- Brain Injury Radio (4 chatters)
- Paranormal Talk 101 (4 chatters)
- Truth Emerges (3 chatters)
- Bill Murray (3 chatters)
- OPWR (3 chatters)
- LivingParanormal (2 chatters)
- Minn4Freedom (2 chatters)
- JADE Radio Network (2 chatters)
- Soul Tree Radio X In The Raw (2 chatters)
- The Hilltop Radio Show (2 chatters)
- AOW Productions (2 chatters)
- Apostle Antonia (2 chatters)
- Alex Cardinale Network (2 chatters)
- Enterpraisement Media Group (2 chatters)
- FreedomizerRadio (1 chatters)
- Hoshaiah Israel (1 chatters)
- ABQ Sports Crew Radio (1 chatters)
- carsonscorner (1 chatters)
- Autistic People (1 chatters)
- BLACK SATIN RADIO LIVE (1 chatters)
- Black Whole Radio (1 chatters)
- The Way Walkers (1 chatters)
- THEE ALMIGHTY ALLSUNDARA (1 chatters)
- T J Sotomayor (1 chatters)
- Kardec Radio (1 chatters)