Bring Your Own Device Acronym Written on BlackboardBYOD

SURVEY: The Evolution of BYOD Security in a Mobile-First World. Bitglass’ research team surveyed 200 IT and security professionals at a national Gartner conference to learn more about the evolution of BYOD security in a mobile-first world. According to the research, one in four organizations lack some form of multi-factor authentication when securing BYOD, which is consistent with well-known enterprise security gaps. Using compromised passwords to control access and single-factor authentication has resulted in several high-profile data breaches in recent months. Enterprises have since turned to technology as a means of solving the secure identity management challenge. Read more

SECURITY: Quarter of Firms Allow Password-Only BYOD Security. Over a quarter (28%) of organizations rely solely on user-generated passwords to secure BYOD, potentially exposing countless endpoints to credential guessing, cracking and theft. Read more.

MESSAGING: The Risks of Messaging Apps in BYOD. Are using messaging apps adding another layer of risk to your business information? Quite possibly, according to research from Infinite Convergence Solutions and 451 Research. That’s because employees are using unsecure messaging applications to communicate with each other, with nearly three in four employees using consumer messaging apps for business purposes. Yet, nearly two-thirds of organizations have done nothing to create security policies around their use. Find out more

READ: Hackers Reveal Leading Enterprise Security Blind Spots. When it comes to cybersecurity, hackers said mobile devices are a critical blind spot. This is unsurprising considering bring-your-own-device (BYOD) policies which connect unknown mobile devices, OS versions, and patch processes to corporate networks. Read more


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems October 2017

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


BYOD – Daily Tech Update – November 9, 2017

Leave a Reply