Tag Archive for Apple

Are Firms Ignorant About BYOD Issues?

Are Firms Ignorant About BYOD Issues?Enterprises are being ignorant towards the issues BYOD is causing to their business says backup vendor Acronis. James Rawbone, Senior Partner Account Manager EMEA, Enterprise Mobility Solutions at Acronis, shared his opinions with Desire Athow at ITProPortal on why and how enterprises are being ignorant towards BYOD issues.

Acronis logoThe Acronis 2013 Global Data Protection Trend Report developed by the Ponemon Institute identified five surprising BYOD trends:

1. There are big gaps in secure BYOD policies across organizations. The Acronis survey found that 60% of businesses have no personal device policy in place, and those with policies 24% make exceptions for executives, who are most likely handling the most sensitive corporate data. As a result, these organizations are increasingly vulnerable to data loss and serious compliance issues.

2.Simple security precautions are not being adopted. The survey found only 31% of companies mandate a device password or key lock on personal devices, and only 21% do remote device wipes when employees leave the company, drastically increasing the risk for data leakage.

3.Businesses underestimate the dangers of public clouds. The researchers report that corporate files are commonly shared through third-party cloud storage solutions such as DropBox, but 67% of organizations don’t have a policy in place around public clouds and 80% haven’t trained employees in the correct use of these platforms.

compatibility and interoperability are still big obstacles4.The growth of Apple (AAPL) devices is complicating BYOD security for administrators. 65% of organizations will support Macs in the next year, and 57% feel compatibility and interoperability are still big obstacles to getting Macs compliant with their IT infrastructure. This puts data stored and shared across the corporate network and on Apple devices at risk.

5.Some organizations are ignoring the benefits of mobile collaboration altogether. More than 30% surveyed actually forbid personal devices from accessing the network.

 tight budgetsMr. Rawbone sees two reasons organizations are not educating or training their employees on the risks of BYOD. First is time and money. Most companies have tight budgets across the board and in particular within their IT department, as well as their overall staffing. The second excuse for not training their staff is that they are unaware that their staff is using these solutions, or they are turning a blind eye to the issues effect their corporate data and overall IT infrastructure.

The Acronis Senior Partner told ITProPortal there are legal and compliance issues associated with BYOD; but generally BYOD can be adapted to each compliance regulation and rule. The main concern of BYOD is data protection and ensuring that as employees bring devices to-and-from the workplace, confidential corporate data is adequately protected while remaining easily accessible. An important part of data protection, often not addressed by BYOD strategies, includes ensuring that information and records comply with privacy laws like the Health Insurance Portability and Accountability Act (HIPAA) and Sarbanes-Oxley (SOX), as well as specific industry and regional privacy regulations.

data protection Mr. Rawbone concludes by reminding the author that the important thing every business needs to remember is that mobile devices can be replaced for a small cost in comparison to having your confidential data stolen and used incorrectly.

Companies need to embrace technological evolution and look at the business benefits of BYOD. Otherwise, he claims they will be facing some serious network and data issues and worst of all potentially facing some legal problems in the coming future.

mobile device security policyCreating a mobile device security policy doesn’t have to be complicated, but it needs to encompass devices, data, and files. The article lists a number of simple things organizations should do, like require users to key-lock their devices with password protection. 68% of those surveyed use VPN or secure gateway connections across networks and systems, and 52% use Microsoft (MSFT) Active Directory and/or LDAP. The simplest place to start is to use device key-lock and password protection.

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Palm Now A Chinese Mobile Company

Palm Now A Chinese Mobile CompanyLet’s take a trip on the way-back machine and visit the first cool – gotta-have-it tech toy, the Palm Pilot. I had several versions of the Palm Pilot, The Palm V was the best version, but the  PalmOne-m515 had a color screen. The oft traded PDA builder moved from Palm to modem-maker US Robotics. Which was later purchased by 3Com, and then Handspring. Next, it was PalmOne/Source and finally purchased in 2010 for $1.2 billion by HP, where many tech firms go to die.

Palm logoNow ChinaTechNews.com reports that the Chinese consumer electronics group TCL recently announced that they will acquire the Palm brand. HP is selling Palm as part of Meg Whitman’s struggles to right the floundering HP (HPQ).

Li Dongsheng, chairman of TCL Group, claims the Palm acquisition is different from their purchase of Alcatel’s mobile division. According to the Chinese firm, Palm has its fans in America and its operating ideas are similar to Apple (AAPL). They believe this type of fandom can give Palm strength. Li said the Palm brand still has value in some of the global markets and people expect its re-emergence to continue to offer innovative products.

ChinaAccording to the article, TCL will launch new Palm products at the end of 2015. TLC plans to position Palm as a high-end smartphone brand. Maybe in China, the Palm name is an innovative mobile terminal brand, which will be closely related to users and fans.

Variety reports from CES that TCL said that it will re-create Palm in Silicon Valley. In the statement TCL claims:

Palm has always carried a lot of affect and emotions … That’s why TCL has set the direction to rebuild the brand involving Palm’s very own community, making it the largest scale crowdsourced project ever seen in the industry.

The firm will back the crowdsourced development of new Palm products with 5,000 engineers and seven research and development centers around the world.

Guo Aiping, CEO of TCL Communication, told ChinaTechNews.com that this acquisition is limited to the Palm brand and it does not include other assets such as employees.

rb-

First, another US company sold to the competition. Just saying.

I agree with ArsTechnica they hypothesize this move could be seen as TCL’s attempt to break into the U.S. smartphone market under a well-known brand. Other Chinese companies such as Lenovo, which now owns Motorola, have a similar strategy of operating in America under a well-known brand.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

2014’s Major Web Vulnerabilities

2014's Major Web Vulnerabilities2014 was the year of cyber-security mega-vulnerabilities. What makes mega vulnerabilities unique are they strike at the core of the Internet infrastructure and can impact nearly every connected device and every Internet user on the globe. 2014 saw the emergence of three mega-vulnerabilities Hearbleed, Shellshock, and POODLE.

Heartbleed, Shellshock, and POODLE were the top three major web vulnerabilities uncovered in 2014 according to Fred Donovan at FierceITSecurity. In case you have not heard of this trio of troublemakers, Web security firm Incapsula produced the following infographic.

The Incapsula infographic looks at each of these vulnerabilities and layout when they were discovered, what type of vulnerability they are, what systems and the number that are affected, the risks posed by the vulnerabilities, their severity, how easy they are to exploit, and the difficulty of fixing. Tim Matthews, vice president of marketing for Incapsula wrote in their blog:

What makes these mega vulnerabilities special is that unlike most vulnerabilities that are specific to a particular OS, browser or software application, these three relate to the core Internet infrastructure (e.g., SSL and Linux devices) and, in essence, affect just about every connected device owner and every Internet user on the globe.

Incapsula 2014 Mega Vulnetabilities

rb-

In their blog, Incapsula warns this is the tip of the iceberg of mega-vuln‘s that exploit other structural core functions of the Intertubes. Wired reports that after 8 months, 300,000 machines remain unpatched against Heartbleed.

  • Web Freedom Is Seen as a Growing Global Issue (cacm.acm.org)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablets Still Don’t Rule the World

Tablets Still Don't Rule the WorldThe rise of tablets like Apple’s (AAPL) iPadSamsung‘s (005930) Galaxy Tab, and the Google (GOOG) Nexus have grabbed PC buyers’ attention and dollars for several years at the expense of the PC market. Lately, however, it seems that the carnage in the PC market has stabilized. And the growth of the mighty Apple iPad has plateaued.

iPhone, iPad, and iPod sales

iPhone, iPad, and iPod sales from Q1 06 to Q3 14 (in million units) | Statista

Cloud computingCould this be because there is no real business case for the tablets? After being on the market for several years, they have not replaced the PC at work. Don Reisinger at eWeek, recently put out 10 reasons why tablets still cannot replace PCs where he argues that the Post-PC Era is yet not a done deal. He argues despite their popularity, tablets still aren’t powerful or capable enough to replace PCs. He states in the article tablets cannot–and will not–replace PCs. Let’s look at his reasons why.

1. Component power

Over the last few years, mobile components running in tablets have gained in power. However, processors such as NVidia’s (NVDA) Tegra 3 or Apple’s A6X still pale in comparison to the power delivered in PC chips from Intel (INTC) or AMD (AMD). Until that changes, tablets can never replace PCs for the power-hungry users among us the author says.

Apple vs. Microsoft2. App availability

Apple’s App Store now offers over 800,000 applications. And although many of them are worthwhile downloads, few actually deliver the complexity and sophistication customers would find in Microsoft (MSFT) Windows or OS X. Nowhere is that more clear than in the comparison of Office on mobile and PCs. Eweek says until apps gain in sophistication, mobile can never keep up.

3. Virtual keyboards aren’t loved

The problem with all tablets is that they come with virtual keyboards. And although more people are warming to virtual keys, there are still many folks around the globe that like having the standard physical keyboard found in PCs. The blog asks why not? Typing on traditional keyboards with two hands is far more accurate and efficient.

virtual keyboard as a reason he does not use a tabletPaul Mah at FierceCIO echoed the authors, citing the virtual keyboard as a reason he does not use a tablet as his primary work device. I have struggled with iPad virtual keyboards, and yes I did try Bluetooth keyboard cases and found them disagreeable.

4. Windows is the enterprise’s favorite

The article notes that Microsoft holds a dominant position in the enterprise. Tablets are just one front on that battlefield. The enterprise is adopting tablets at a rapid rate. But that doesn’t mean that the corporate world is ready to drop Windows for iOS or Android. In fact, Windows is still the most important software solution for enterprise users. Granted, Microsoft is bringing Windows to tablets, but for now, those products aren’t proving popular. Until they do catch on, PCs will win out.

5. Think about enterprise productivity

Productivity in the enterpriseProductivity in the enterprise is extremely important. And on that front, Mr. Reisinger says PCs are still winning out, Forbes recently estimated that MSFT Office market share will drop from its current 95% to 90% by 2016. Notebooks deliver the same level of mobility as tablets, and desktops deliver the power that designers and other employees might need. Simply put, PCs are still the ideal productivity-maximizing solutions for enterprise users.

6. Tablet prices are still too high

Tablets are expensive. The latest iPad launch can set customers back $929 for 128GB of storage and 4G LTE support. A more powerful notebook can be purchased for several hundred dollars less. The author believes that given the state of the economy and the fact that many tech buyers are looking to save cash wherever possible, PCs can’t be considered obsolete in their battle with tablets.

7. Notebooks are turning into tablets

mobile malware eWeek points out that PC vendors have made the smart decision to cut off the rise of tablets by delivering touch functionality in their products. Lenovo’s Yoga, for example, has a screen that can swivel around and sit atop the keyboard to act as a tablet. As more notebooks take on tablet functionality, devices like Apple’s iPad might look like an awfully poor value for the price.

8. More options across the PC market

The sheer number of options available to customers in the PC market is something that can’t be overlooked. From notebooks to laptops to desktops to ultrabooks, there’s something for everyone. Best of all, the components in those products can be customized to match the respective customer’s needs. The blog concludes that choice, outside of storage space, is something sorely lacking in the tablet market. And customers know it.

9. The security advantage is going away

 

Tablet malwareWhen tablets started to make inroads into the PC market, many speculated that it was because of the comparative safety that went along with using such products over notebooks. Now, the author says things have changed. Android is the top target for malicious hackers now, according to several security reports, and has become the next frontier in malware. That could prove extremely troublesome for tablet adoption if things continue to get worse.

10. Tablet OSs need to grow up

Android and iOS, the two most popular tablet operating systems, are nice and effective in the mobile world. But they haven’t grown up yet. Mr. Reisinger says Apple’s iOS, lacks a file system. Android comes in too many flavors for customers to get comfortable with its functionality. Mobile operating systems have to grow up. If they don’t, tablets will never match PCs.

rb-

Huge phoneI just got back from the annual run to the big-box store for Christmas shopping and saw another reason the tablet still does not rule the world. Pfablets.  Some of these things are just as big as an iPad Mini. Now it’s time for a good Gin and Tonic after facing the holi-dazed shopping hordes.

Dell and Intel released a report [pdf] that says the desktop is still the workhorse of the average office. They found that 77% of office tasks are completed with a traditional PC.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Subpeona Served for LA iPads

Subpeona Served for LA iPadsThis bad idea never seems to go away. Remember the Los Angles Unified School District’s $1.3 billion iPads-for-all project? LAUSD big-wigs claimed that the Apple iPads and Pearson software would raise LA students’ Common Core test scores. I covered the questionable decision here and here. While the proverbial other-shoe appears to be dropping. Not only did the apparent sweetheart deal between the LAUSD Superintendent, Apple (AAPL), and Pearson (PSO) cost Supt. John Deasy his $350,000 a year job – now the Feds are involved.

FBI served a subpoena against the LA school districtThe LA Times reports that the FBI served a subpoena against the LA school district which compelled America’s second-largest school district to cough up 20 boxes of documents related to the flawed iPad project, to a federal grand jury.

The subpoena asked for documents related to the bidding process as well as to the winning bidders in the $1.3-billion poorly planned project. The subpoena, which was provided to The LA Times, is part of a wide-ranging investigation is looking into records related to Apple and Pearson that predate the bidding process or that involve other projects. The article says the documents sought include all kinds of documents:

… score sheets; complete notepads, notebooks and binders; reports; contracts; agreements; consent forms; files; notices; agenda; meetings notes and minutes; instructions; accounting records” and much more.

The article notes that the morning after the FBI seized the documents, Supt. Ramon C. Cortines said he was shelving the contract. He denies that decision was based on the surprise visit by the FBI. Supt. Cortines told the LA Times;

We’re not going to use the original iPad contract anymore. I think there have been too many innuendos, rumors, etc…

rb-

The grand jury process has recently developed a credibility problem in the US. So who knows what they will find in this case. Apple and Pearson have billions in cash to spread around to “educate” people about how great they are.

This just goes to prove how the confluence of bad ideas, poor planning, and greed can go terribly wrong.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.