IoT: Securing the Unknown

Posted by & filed under BYOD, Security.

Today’s blog is brought to you by Matt Dehond.  Matt has been a part of Brite’s security team for 2 years.   Technology is an ever-changing field. The world has become more and more dependent on technology to get us through our daily tasks. While this has made life easier for most people and businesses, it also creates… Read more »

Managing the Flow of Devices (better then Lucy)

Posted by & filed under BYOD, Security.

If you are a fan of classic comedy television, you probably know this “I love Lucy” skit: In this situation, Lucy and Ethel have no problem with the slow trickle of chocolates, but the belt speeds up and the influx of Chocolates is just too great for the ladies, despite their creative efforts! As an… Read more »

How are you controlling BYOD devices?

Posted by & filed under BYOD, Security.

  Seeing is believing, control is even better. It is no secret that the number of connected devices has and will continuing to grow at an explosive rate.  Gartner estimates by 2020, the number of connected devices will exceed 20 billion. For me, it is pretty easy to believe their estimate.  Like most people, I… Read more »

Rochester Security Summit: Stephen Johnson, Check Point

Posted by & filed under BYOD.

We’re less than a week away from the Rochester Security Summit! The theme of this year’s event? The Right to Privacy: Balancing Privacy and Security. Speakers include cyber security experts from various verticals, who will all touch on the latest trends in security and how organizations balance privacy and security of data. Speaking at this year’s event is Stephen… Read more »

Guest Registration Affects Endpoint Security

Posted by & filed under BYOD.

“You are the company you keep.” We’ve all heard the expression before, and it’s a phrase that originated from Bible scripture. The message is simple: Be careful who you surround yourself with, because they will shape you into who you are. It’s a message that carries over well to the data-protection and cyber-security world that we live… Read more »

Growing Threats of Bring Your Own Devices

Posted by & filed under BYOD.

Bring Your Own Devices (BYOD) concerns are growing as employees are using their personal devices in the workplace.  Previously, it was uncommon for someone to use a non-office appointed device, but now, according to a recent Ovum survey, nearly 70% of employees use personal devices in the workplace, while one third of this group are… Read more »

More Things Means More Security

Posted by & filed under BYOD, Security.

“We need to empower computers with their own means of gathering information, so they can see, hear and smell the world for themselves, in all its random glory. RFID and sensor technology enable computers to observe, identify and understand the world—without the limitations of human-entered data.” With that statement by Kevin Ashton from the RFID Journal, the… Read more »

7 Tips for BYOD

Posted by & filed under BYOD.

The growing demand for a network access control (NAC) solution is significantly fueled by the Bring Your Own Device (BYOD) phenomenon. A few years ago, the use of personal devices in the office was a rare occurrence. Lately, employees have become more in favor of using personal devices. According to a recent survey from Ovum,… Read more »

The End is Nigh: Windows XP Goes End-of-Life

Posted by & filed under BYOD.

For the consumer, the solutions are fairly simple: upgrade or take a risk. In fact, Microsoft is offering consumers a $100 gift card for those that are looking to upgrade. For the enterprise, there is more too it than just upgrading. Yes, the answer is organizations will need to migrate all of their machines to… Read more »

BYOD: Network Access Control

Posted by & filed under BYOD.

In today’s world a large percentage of the devices connected to company networks are unknown to administrators. This trend is growing as the number of mobile devices in the workplace grows and Bring Your Own Device (BYOD) policies become the norm. A concern with BYOD policies is that the devices are not the property of… Read more »