search

Sid Vandervinne

Recent Posts by Sid Vandervinne:

Firms still lacking in mobile data security

It’s no secret that mobile users are more likely to fall victim of phishing scams than users on desktop. That’s because most people have their mobile phones on them just about all the time, and are less likely to scrutinize messages sent through text or social media. Somehow, people are not as suspicious of short texts as they are of emails, and can be more ambivalent about mobile data security.

Topics: Security

Why it’s essential to develop a security culture

According to the Office of the Australian Information Commissioner, of the organisations reporting data breaches in the last quarter, more than one third of them could put those breaches down to failings in their security culture.

Topics: Security

Quora data security breach sounds alarm bells for all businesses

News last week of the Quora data security breach should serve as a wake-up call for all businesses. The widely used question-and-answer website was compromised by a malicious third party, impacting the account information of approximately 100 million users, including names, email addresses and encrypted passwords.

Topics: Security

How to resolve complex enterprise mobility management challenges

By 2025, IDC research predicts approximately 80 billion devices will be connected to the Internet. While I’m sure this comes as no surprise to anyone involved in enterprise mobility, the growing number of mobile devices, models, platforms and operating system versions is making this job harder to manage and creates ever more complex enterprise mobility management challenges.

Topics: Security Lifecycle

What you need to know about enterprise mobility TCO

In a very short space of time mobile has evolved from being another device for IT to support, to a new way of doing business. One that allows employees to do the same work they can do at their desk, from any location at any time. In the age of flexibility, employees are no longer shackled to their desks, but tethered to their mobile devices.

Topics: Management Security Lifecycle