One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 452282
Date de publication 2017-12-19 20:52:40 (vue: 2017-12-19 20:52:40)
Titre NBlog December 19 - sticky ends
Texte Surveys typically show that: Most organizations have some form of BYOD scheme encouraging or permitting workers to use their own laptops, smartphones and tablets for work; andIoT is spreading fast but still has a long way to go before it peaks.We infosec geeks may throw up our hands in horror ... but the facts remain: BYOD and IoT are popular, now. They are here to stay and almost certain to expand.It's too late now for us to bleat on about the information risks and security concerns*. The train has long since left the station.So how should we handle this situation? An obvious approach is to retrospectively identify, assess and treat the information risks as best we can, emphasizing threats such as hackers, malware, theft or loss of information, and inappropriate disclosure, and promoting security controls such as - well, that's where it gets tricky because we have limited options for technical controls, and (despite our best efforts!) security awareness is never going to be a total cure for employees being incautious or careless. Being so negative and constrained, it's hardly a convincing argument. You could say it's also behind the times, fighting the last war as it were.Instead, we're taking a more proactive and upbeat line in the NoticeBored content for January. There are business opportunities in going with the flow, embracing BYOD and IoT (where appropriate), making the best of the rapidly evolving technology and forging ahead. Maybe we can't fix everything today, but we surely can make tomorrow better. Here's a single example: if a company's widgets can be smartened-up and networked, they might just catch the wave. Innovation is a vital component of brand value for many organizations, a common strategic driver. Provided the technology, security and privacy aspects are sufficiently well addressed, smart, networked widgets may be used to gather information about how the widgets are used in practice by real customers, en masse, giving valuable insight to drive furthe
Envoyé Oui
Condensat  finding  here about addressed admit ahead almost also andiot answer approach appropriate are argument aspects assess attractive audiences awareness because before behind being being so best better bleat brand business but byod can careless catch certain come common company component concerns* constrained content controls convincing could cure customers cynical december despite development developments did disclosure drive driver efforts embracing emphasizing employees encouraging end ends energize everything everything: evolving example: examples excitement expand exploring express fact facts fast feedback field fighting fix flow forging form frame further gather geeks get gets giving going grips hackers handle hands happily hard has have here horror how identify improve inappropriate incautious inertia information infosec innovation insight instead iot january journey just keep kept laptops last late least left like limited line long loop loss make making malware many masse materials may maybe might mind more motivate motivational must nblog negative networked never new not noticebored now obvious occupied off opportunities options organizations other own peaks permitting popular positive potentially practice previously privacy proactive product promoting provided ps  raise rapidly rather real reasons remain: retrospectively risk risks s hardly say scheme security set several should show similarly since single situation smart smartened smartphones some spreading station stay stay and sticky stop strategic successfully such sufficiently surely surveys tablets taking technical technology than that that: most theft they though threats throw times today tomorrow too total train treat tricky try typically upbeat use used usual valuable value vital war wave way well where widgets will work; workers world worse
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: