CIO Symmetry:

network security policy

1

May 10, 2012  3:46 PM

The most popular mobile OS? Hint: It’s not an Apple product



Posted by: Wendy Schuchart
Android, Apple, BYOD, Google, Hacking, mobile devices, mobile technology, mobile workforce, network security policy, Operating systems, Security, security risk, SMB security

We've scoured the Web looking for the top notes for your executive lunch break. This week, we're digging into mobile and smartphone news, including the most popular mobile device and the risks your BYOD users are facing with the latest Android malware attacks. The majority of U.S. mobile users...

August 19, 2011  2:21 PM

Scorned employee exploits network security policy after layoffs



Posted by: Wendy Schuchart
CIO, network security policy, rogue employees, security risk

Picture this scenario: Employee A leaves the company to take another position. Your network security policy demands that you kill his ids and passwords, right? What about if Employee B leaves the company in a way that isn't entirely voluntary? You certainly kill his access, tout suite, but...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: