Tag Archive for 2015

Are Firms Ignorant About BYOD Issues?

Are Firms Ignorant About BYOD Issues?Enterprises are being ignorant towards the issues BYOD is causing to their business says backup vendor Acronis. James Rawbone, Senior Partner Account Manager EMEA, Enterprise Mobility Solutions at Acronis, shared his opinions with Desire Athow at ITProPortal on why and how enterprises are being ignorant towards BYOD issues.

Acronis logoThe Acronis 2013 Global Data Protection Trend Report developed by the Ponemon Institute identified five surprising BYOD trends:

1. There are big gaps in secure BYOD policies across organizations. The Acronis survey found that 60% of businesses have no personal device policy in place, and those with policies 24% make exceptions for executives, who are most likely handling the most sensitive corporate data. As a result, these organizations are increasingly vulnerable to data loss and serious compliance issues.

2.Simple security precautions are not being adopted. The survey found only 31% of companies mandate a device password or key lock on personal devices, and only 21% do remote device wipes when employees leave the company, drastically increasing the risk for data leakage.

3.Businesses underestimate the dangers of public clouds. The researchers report that corporate files are commonly shared through third-party cloud storage solutions such as DropBox, but 67% of organizations don’t have a policy in place around public clouds and 80% haven’t trained employees in the correct use of these platforms.

compatibility and interoperability are still big obstacles4.The growth of Apple (AAPL) devices is complicating BYOD security for administrators. 65% of organizations will support Macs in the next year, and 57% feel compatibility and interoperability are still big obstacles to getting Macs compliant with their IT infrastructure. This puts data stored and shared across the corporate network and on Apple devices at risk.

5.Some organizations are ignoring the benefits of mobile collaboration altogether. More than 30% surveyed actually forbid personal devices from accessing the network.

 tight budgetsMr. Rawbone sees two reasons organizations are not educating or training their employees on the risks of BYOD. First is time and money. Most companies have tight budgets across the board and in particular within their IT department, as well as their overall staffing. The second excuse for not training their staff is that they are unaware that their staff is using these solutions, or they are turning a blind eye to the issues effect their corporate data and overall IT infrastructure.

The Acronis Senior Partner told ITProPortal there are legal and compliance issues associated with BYOD; but generally BYOD can be adapted to each compliance regulation and rule. The main concern of BYOD is data protection and ensuring that as employees bring devices to-and-from the workplace, confidential corporate data is adequately protected while remaining easily accessible. An important part of data protection, often not addressed by BYOD strategies, includes ensuring that information and records comply with privacy laws like the Health Insurance Portability and Accountability Act (HIPAA) and Sarbanes-Oxley (SOX), as well as specific industry and regional privacy regulations.

data protection Mr. Rawbone concludes by reminding the author that the important thing every business needs to remember is that mobile devices can be replaced for a small cost in comparison to having your confidential data stolen and used incorrectly.

Companies need to embrace technological evolution and look at the business benefits of BYOD. Otherwise, he claims they will be facing some serious network and data issues and worst of all potentially facing some legal problems in the coming future.

mobile device security policyCreating a mobile device security policy doesn’t have to be complicated, but it needs to encompass devices, data, and files. The article lists a number of simple things organizations should do, like require users to key-lock their devices with password protection. 68% of those surveyed use VPN or secure gateway connections across networks and systems, and 52% use Microsoft (MSFT) Active Directory and/or LDAP. The simplest place to start is to use device key-lock and password protection.

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

What Holds the Internet Together

What Holds the Internet TogetherThose that have followed the Bach Seat for a while, know that I am fascinated by maps. A well-done map can say so much more than a written description. One of my favorite things to do at work is to work on maps; network maps, rack elevations, logical diagrams, they just make it so much easier to discuss how to get from A to B if you can see it.

TeleGeography logoThe BusinessInsider published some cool maps from telecom data company TeleGeography of the submarine cables that hold the Internet together around the world. The maps are interesting to me for a couple of reasons, first, is the engineering wonder of how all those cables get installed, and the mind-boggling amount of information they enable, and the small number of places where they all come out of the water. My first thought looking at some of these maps was I wonder what the no such agency is doing at those sites.

The main map charts out all the undersea fiber optic cables that send Internet communication from country to country. There are more fiber optic cables that are land-based, but they’re not charted here. Here is a map of the current undersea fiber connections on the US eastern seaboard.

Atlantic fiber optic cables

Paul Brodsky, an analyst at Telegeography explained to BI how data gets around the world.

The vast majority of Internet traffic travels on fiber optic cables … Many people think Internet connections go through satellites … but that’s not the case. They run through these undersea cables.

This map shows the undersea cables that link China, Japan, South Korea, and Russia to the Internet. It also shows that North Korea does have a dedicated direct connection to the rest of the world, the Hermit Kingdom, indeed. The picture is kind of awkward because China is in blue, which you would expect to be water.

Pacific fiber opric cables

TeleGeography’s Brodsky explained to BI how the cables get installed. The companies that lay these cables have giant spools of fiber optic cable on their ships. The ship goes from country A to country B and literally lays it on the bottom of the ocean. Close to the shore, they trench it out, but at a certain distance from the coast, it just lies on the bottom of the ocean.

Coiling trans-Atlantic cable in 1857The biggest risk to the cables are trawlers, and ships dragging anchors. Sometimes there are natural disasters like earthquakes. But if one cable breaks, Internet traffic can be redirected to another cable.

Mr. Brodsky says the companies that lay the cables can track problems. If they spot something, they can go out to the middle of the ocean, pull up the cable and cut out the damaged section, and splice in a new segment of cable.

In the future, expect more cables, Mr. Brodsky told BI. Now that the world is connected, the next step is to add more connections. Any country with just one cable will want two or three.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Palm Now A Chinese Mobile Company

Palm Now A Chinese Mobile CompanyLet’s take a trip on the way-back machine and visit the first cool – gotta-have-it tech toy, the Palm Pilot. I had several versions of the Palm Pilot, The Palm V was the best version, but the  PalmOne-m515 had a color screen. The oft traded PDA builder moved from Palm to modem-maker US Robotics. Which was later purchased by 3Com, and then Handspring. Next, it was PalmOne/Source and finally purchased in 2010 for $1.2 billion by HP, where many tech firms go to die.

Palm logoNow ChinaTechNews.com reports that the Chinese consumer electronics group TCL recently announced that they will acquire the Palm brand. HP is selling Palm as part of Meg Whitman’s struggles to right the floundering HP (HPQ).

Li Dongsheng, chairman of TCL Group, claims the Palm acquisition is different from their purchase of Alcatel’s mobile division. According to the Chinese firm, Palm has its fans in America and its operating ideas are similar to Apple (AAPL). They believe this type of fandom can give Palm strength. Li said the Palm brand still has value in some of the global markets and people expect its re-emergence to continue to offer innovative products.

ChinaAccording to the article, TCL will launch new Palm products at the end of 2015. TLC plans to position Palm as a high-end smartphone brand. Maybe in China, the Palm name is an innovative mobile terminal brand, which will be closely related to users and fans.

Variety reports from CES that TCL said that it will re-create Palm in Silicon Valley. In the statement TCL claims:

Palm has always carried a lot of affect and emotions … That’s why TCL has set the direction to rebuild the brand involving Palm’s very own community, making it the largest scale crowdsourced project ever seen in the industry.

The firm will back the crowdsourced development of new Palm products with 5,000 engineers and seven research and development centers around the world.

Guo Aiping, CEO of TCL Communication, told ChinaTechNews.com that this acquisition is limited to the Palm brand and it does not include other assets such as employees.

rb-

First, another US company sold to the competition. Just saying.

I agree with ArsTechnica they hypothesize this move could be seen as TCL’s attempt to break into the U.S. smartphone market under a well-known brand. Other Chinese companies such as Lenovo, which now owns Motorola, have a similar strategy of operating in America under a well-known brand.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Who Runs The Internet

Who Runs The InternetWhile no one “owns” the Internet (for now, despite republican plans) there are a handful of companies that control the Internet. Unless you are a techno-geek, these six organizations that control how the Internet works, most likely fly under your radar.

 

International Telecommunications Union

United Nations International Telecommunications UnionThe first organization that is actively trying to take over the functions of the Internet is the United Nations International Telecommunications Union (ITU). The ITU in my and many other opinions an outdated, pointless throw-back to the days of the telegraph, with policies to match. I covered the last power grabs by the UN’s ITU here.

Internet Architecture Board

Next is the Internet Architecture Board (AIB). The IAB is the overseer of the technical evolution of the Internet. The IAB supervises the Internet Engineering Task Force (IETF), which oversees the evolution of TCP/IP, and the Internet Research Task Force (IRTF), which works on network technology.

Internet Architecture BoardThe IAB declared a major strategic move for the Internet. The Internet Architecture Board is calling for global encryption on the web (which I have covered many times from my Bach Seat) to become the norm across the Internet in a move to lock down the privacy and security of information exchange according to Dark Reading.

Internet Engineering Task Force

Internet Engineering Task Force

The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards. It is most well known for the standards that make up the Internet protocol suite (TCP/IP). It is an open standards organization, with no formal membership or membership requirements. All participants and managers are volunteers, though their work is usually funded by their employers or sponsors. The IETF is also well-known for its RFCs or Request for Comment documents like RFC RFC 1918 and RFC 873.

Internet Society

Internet SocietyAnother organization that shapes the Intertubes is ISOC. The Internet Society (which I am a member of) was formed in 1992 by Vint Cerf and Bob Kahn. ISOC was formed to provide a corporate structure to support the Internet standards development process.

Internet Corporation for Assigned Names and Numbers

The Internet Corporation for Assigned Names and Numbers (ICANN) is perhaps the most critical organization that helps run the Internet. ICANN coordinates the distribution of IP addresses and the Internet’s Domain Name System (DNS). IP addresses are the numbers that are assigned to every computer on the Net to uniquely identify each device. There are two types of IP addresses, IPv4 and IPv6. The web has run out of IPv4 addresses (which I covered here and here) and is very slowly being replaced with IPv6 addresses. ICANN doles out these addresses.

Internet Corporation for Assigned Names and NumbersICANN also manages the Domain Naming System (DNS) on the web that converts IP addresses to names. DNS makes it possible to remember www.google.com, which is easy for humans to remember instead of remembering https://web.archive.org/web/20150507211330/http://74.125.224.72/, which is easy for computers to deal with, to get to Google.

The U.S. government funds ICANN. They Feds have gotten heat from around the globe after Eric Snowden’s revaluations about global spying operations. The role of ICANN is changing.

Internet Service Providers

on rampThe only group that makes money on the Internet but does not help run the Internet (yet) are the Internet Service Providers (ISP). ISP’s control nearly everyone accesses it. The gatekeepers to the web are ATT (T), Comcast (CMCSA), Charter (CHTR) and Time Warner Cable (TWC) are the biggest names of ISP’s. ISP’s “perform” two key functions. First, they provide last-mile connections, that is the connection to your home or business to their offices, which we all over-pay for. Next, they provide back-haul or backbone services that move your email across the town or across the globe. The ISP’s also make money on these ISP-ISP connections.

Right now the FCC is considering the future of the Internet during its Net Neutrality decisions. If the ISP’s get their way, it is likely that homes and businesses will be required to pay the ISP’s more money to maintain the crappy service we already get.

 

Six shadowy organizations that run the Internet infographic

rb-

Let’s add this up big business telecom money + millionaire politicians = the 1% screwing the rest of us. Get involved, save the Internet, get in touch with your alleged representatives and tell them NO MORE. 

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

2014’s Major Web Vulnerabilities

2014's Major Web Vulnerabilities2014 was the year of cyber-security mega-vulnerabilities. What makes mega vulnerabilities unique are they strike at the core of the Internet infrastructure and can impact nearly every connected device and every Internet user on the globe. 2014 saw the emergence of three mega-vulnerabilities Hearbleed, Shellshock, and POODLE.

Heartbleed, Shellshock, and POODLE were the top three major web vulnerabilities uncovered in 2014 according to Fred Donovan at FierceITSecurity. In case you have not heard of this trio of troublemakers, Web security firm Incapsula produced the following infographic.

The Incapsula infographic looks at each of these vulnerabilities and layout when they were discovered, what type of vulnerability they are, what systems and the number that are affected, the risks posed by the vulnerabilities, their severity, how easy they are to exploit, and the difficulty of fixing. Tim Matthews, vice president of marketing for Incapsula wrote in their blog:

What makes these mega vulnerabilities special is that unlike most vulnerabilities that are specific to a particular OS, browser or software application, these three relate to the core Internet infrastructure (e.g., SSL and Linux devices) and, in essence, affect just about every connected device owner and every Internet user on the globe.

Incapsula 2014 Mega Vulnetabilities

rb-

In their blog, Incapsula warns this is the tip of the iceberg of mega-vuln‘s that exploit other structural core functions of the Intertubes. Wired reports that after 8 months, 300,000 machines remain unpatched against Heartbleed.

  • Web Freedom Is Seen as a Growing Global Issue (cacm.acm.org)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.