Posts Tagged ‘data privacy’

Monday, March 5th, 2012

Mobile Devices: A Major Concern For Data Security

Your computer may be safe, but if you use your phone for work you may be significantly increasing your company’s risk for data theft. In a recent study seeking to better understand global mobility risks revealed that 51 percent of organizations that lose data do so via mobile phones and tablets. The problem is that mobile devices are essential to a lot of businesses, but there are not many companies who know how to protect their data, much less enforce mobile regulations.

More than half of employees who use portable and mobile devices for work take data from their companies every day. This has led to seventy-five percent of companies losing data from mere neglect alone. With IT departments focusing primarily on computer security, there is a large hole for hackers to gain entrance and steal confidential data. Add this to the fact that twenty percent of companies have no idea how to handle the problem, and we begin to see the scale of this issue.

However, if you are a little more conscious of the problem, you can steer your company away from conceivable data security risks in the future. A few ways around this issue is for your company to make sure data is encrypted on every mobile device and adding a “remote kill” switch in case any devices are lost or stolen. You can also add a content audit on all devices so you know what info has been lost or stolen. Other than that, you should encourage a strict mobile policy to protect company data, something that might take a little bit of employee training and time. Here’s Business Solutions’ thoughts on mobility and company data security:

A new “Global Study on Mobility Risks” reveals that corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies. Seventy-seven percent of more than 4,000 respondents in 12 countries agree that the use of mobile devices in the workplace is important to achieving business objectives. But 76 percent also believe that these devices put their organizations at risk—and only 39 percent have the necessary security controls to address the risk.
“IT has spent years working on desktop security and trying to prevent data loss over web and email channels—but mobile devices are radically changing the game,” said Tom Clare, senior director of Product Marketing Management. “Tablets and iOS devices are replacing corporate laptops as employees bring-their-own-devices to work and access corporate information. These devices open the door to unprecedented loss of sensitive data. IT needs to be concerned about the data that mobile devices access and not the device itself.”

Click to Read More

Saturday, February 25th, 2012

Top 3 Ways to Protect Your Online Privacy

1. Use A Good Browser
Do not use an out of date version of Internet Explorer. Although Microsoft has updated their browser pretty well recently, it just happens to be the most popular browser: the more people use a particular browser, the more hackers and jerks who will try to make victims of its users. Google Chrome is currently the most secure browser, and it also happens to be one of the fastest. Some computers have trouble running it well, so you can also try Firefox, a close second.

2. Play With Social Media Privacy Settings
Facebook is somewhat notorious for its privacy settings, and consistently updates their privacy terms and options. With the timeline becoming the only way to use the site, some people are worried about how to protect their past from unwanted stalking. Well good news: you can limit your old posts. It’s definitely worth it to take five minutes out of your day to play with you privacy settings to make sure your information is stored/shared the way you want. This also goes for Twitter, Youtube, etc. Seriously, go do this. You will not regret it.

3. Think About Encrypting Your Data and Network
VPNs, which of course we are a fan of, have a lot of benefits on top of just privacy. They can also protect you from deep packet inspection by encrypting your data and network connection. This way, your ISPs stays hidden and safe.

Join us at :

©  2012 BolehVPN. All rights reserved. Sales: [email protected] | Support: [email protected]