Archive
Surprising Stats About Mobile Security
Another good article!!
Surprising Stats About Mobile Security
IT security and data protection are the top ranked challenges faced by many mobile IT asset managers. This was certainly brought to light in Mobile Enterprise’s IT headaches executive survey, and recent research from the International Association of IT Asset Managers (IAITAM) brings this to light as well.
Lost/Stolen Devices Covered
Asset Tracking?
BYOD
Do you really need a #BYOD policy? – via @GeneMarks
This is a really good article by Gene Marks!
Social media. Cloud computing. Gamification. SaaS. Social CRM. Virtualization. Mobile. Every year we hear of the latest technology issues facing small business owners like me. And now it’s BYOD (Bring Your Own Device). Everywhere I read in the tech world it’s BYOD. That’s because with the proliferation of smartphones, tablets and mini-laptops it’s become the hot tech security issue. Whitepapers are written. Seminars are conducted. Roundtables are moderated. It’s a BYOD year.
I have 10 people in my company. And a half dozen other contractors. These people are using smartphones, tablets and laptops to access our data. We do not have a BYOD policy. Do I really need one? Do all businesses, big or small, need to really worry about this? Or is just another scare tactic from a bunch of IT guys looking to put fear into their clients’ minds and generate additional billable hours.
Hmmm.
The fact that everyone in my company has a different smartphone is of no concern to me. Why should I care if Sam prefers his iPhone but Josh likes his Droid? They are using their phones to call clients on Verizon or AT&T or whatever so I’m not exposed to any risk there. The same with texting. But uh oh…then there’s email. Am I exposed to security issues when they send and retrieve email from our server? No. That’s because we have a hosted mail server and each employee has their own login to their email account. They set up their email on their own with instructions we gave them. Viruses, spam and all the other evil things that could happen via email are (hopefully) controlled by the security software running at the server level.
Letting Go of the 12 Behaviors Holding You Back
This post was great, thanks Mattias Tronje for sending it!
Read it and think about how you can improve!
“12 Behaviors that always hold leaders back:
- Avoiding. Avoiding is the path to mediocrity.
- Copying others and losing you. Copying others is useful when it aligns with your strengths. When it doesn’t align, it creates stress, pressure, frustration, and failure.
- Over thinking and under acting; stressing preparation over execution. Most organizations plan well and execute poorly.
- Hiding from what you really think or feel. The need to please others causes you to lose yourself.
- Asking “why” too much.”
Continue reading here…
//Richard




