BYOD – Should family members use the device?

BYOD (Bring your own device) is a great concept and it can work.  I recently read an article on an opinion that made mereally think of how some look at this concept and its security as though the IT pros are over protective.

The opinion was that if you used BYOD,  how it would change business and industry to a point that it could help these entities by having employees be more productive.   The opinion went on to say that the IT personnel were looking at password changes, encryption and remote wiping of the device along with wiping the device if the password was attempted too many times.   The concern (author of the article) was if your child used the device, the child could erase the device and personal data on the device.   Should anyone use the device in your family if company data (email, documents, etc.) is on the device?

My belief is that if company documents were or are on the device, it is a way to PROTECT the data on the device if it falls in the wrong hands.  (See the Identity Theft Resource Center’s breaches).   Companies should protect the data.

Privacy hackers | Homeland Security News Wire

The U.S. Federal Trade Commission (FTC) has charged two businesses with illegally exposing the sensitive personal information of thousands of consumers by allowing peer to peer file-sharing software to be installed on their corporate computer systems…Privacy hackers | Homeland Security News Wire.

The article goes on to say….”The agency charged that the company did not have an appropriate information security plan, failed to assess risks to the consumer information it stored, did not adequately train employees, did not use reasonable measures to enforce compliance with its security policies, such as scanning its networks to identify any P2P file-sharing applications operating on them, and did not use reasonable methods to prevent, detect, and investigate unauthorized access to personal information on its networks. According to the agency, the failure to implement reasonable and appropriate data security measures was”

Read the full article above.

Thanks Eva!

A graph that shows how websites connect and how data can be collected

Just saw a student’s post on an add-on you can get for Chrome.  Adam shared a link to Collusion for Chrome at Chrome’s webstore.  This add-on compiles information from the websites that bind to one another and builds a graph inside of Chrome.

The graph can show exactly how a site has a relationship to other sites.   Hover your mouse over a site and you can pinpoint how that site is interconnected to others.   Data is compiled only on your computer and the graph can be reset.  This graph shows only 15 minutes of surf time.


Hovering over a website -

Just click away – it’ll be ok…

Here’s 10 things the younger generation is doing online and how they can stop behavior that can lead to malicious theft of data and great food for thought about their online reputation.
10 things Gen Y do online.. and shouldn’t.  – Charlie Osborne – ZDNet

Generation Y Won’t Listen To IT

The latest generation of desk-jockey’s admitted in a recent CISCO study that they frequently ignore and/or circumvent the information technology (IT) policies of their employers, heightening corporate risk.

The ISCO Connected World Technology Report surveyed some 2,800 college students and young professionals in 14 of the world’s fastest growing economies. The report found that two thirds of young employees worldwide admitted to breaking a number of IT policies with regularity, with many saying they didn’t believe they were doing anything wrong…Read more….Generation Y Won’t Listen To IT.


The Three Most Frequently Attacked Mobile Devices

“iPads pose the worst risk as far as data leakage in concerned since they are mainly used for consumption of enterprise information in various form of documents,” says Guy Levy-Yurista, vice president of products and development for AirPatrol. “This sensitive info is not properly encrypted, and is rarely confined to the device; it can be easily forwarded to a private account and out of the control of the enterprise.”
via The Three Most Frequently Attacked Mobile Devices – Dark Reading.

Now hiring: companies move away from outsourcing to control their IT destiny

The tight IT jobs market and desire for more control over tech projects has many companies insourcing  projects and growing internal staff.

via Now hiring: companies move away from outsourcing to control their IT destiny.

Steve Jobs was a leader

Steve Job’s should be remembered as one of America’s greatest leaders of industry.  Apple’s fame and fortune is because of this great leader.   Little known to most, Bill Gates and Steve Jobs were not just competitors – they were friends.

I have been asked my views on the Apple vs. Microsoft question a million times.  Here’s my personal view.

“It is the competition and ingenuity of both Apple and Microsoft that gives the consumer not only a choice, but the tools necessary to operate a successful enterprise.   By listening to each of these creators and innovators and watching these companies go back and forth with technology over the last several decades, there is no clear winner in the IT world.   Leaders such as these bring visions and dreams to the table.   Today America lost an industry leader who through his perseverance never gave up and with his creativeness helped to transform the way we live our lives today.  Companies today could and should learn from the way he lead Apple.   Being a teacher, IT Manager and private consultant, it is my hope that America’s youth has the drive for ingenuity and creativity that Steve Jobs had.”

“To create a new standard, it takes something that’s not just a little bit different, it takes something that’s really new and really captures people’s imagination and the Macintosh, of all the machines I’ve ever seen, is the only one that meets that standard.”
–Microsoft founder Bill Gates, 1984

“If I were running Apple, I would milk the Macintosh for all it’s worth–and get busy on the next great thing. The PC wars are over. Done. Microsoft won a long time ago.”
–Steve Jobs, 1996

Bill Gates’ note on Steve Jobs’ passing.

Make note of the final words by Steve Job’s during this interview below.

“And, you know, I think of most things in life as either a Bob Dylan or a Beatles song, but there’s that one line in that one Beatles’ song, “you and I have memories longer than the road that stretches out ahead.”  ” And that’s clearly true here.” , Steve Jobs referring  to his friendship with Gates….




Lenovo ThinkPad Tablet Puts Business First

Lenovo’s new ThinkPad Tablet flips the “consumerization of IT” paradigm by adding business-class capabilities, says eWEEK Labs analysts. Features include management software, full-size peripheral connectors and an optional digitizer pen. The 10.1-inch Android device offers an Nvidia Tegra 2 dual-core chip, and applications are bright and clear.  Read more on eWeek