Bring the Discussion on Bring-Your-Own-Device (BYOD)
Bring-Your-Own-Device (BYOD) is the global trend of employees using their personal devices in the workplace, including, smart phones, laptops, tablets etc. This kind of activity can put an organization’s security at risk as it can expose critical company data by loss or become a point of entry for data theft. To negotiate this concern, device management and BYOD policy is imperative as this affects business and government environments worldwide. According to Gartner, companies in the United States are two times more likely to allow BYOD than in Europe and countries such as India, China and Brazil are most likely using personal devices, usually mobile phones. This becomes more complex as companies continue to globalize.
To contextualize this conversation to your customers, here are some very telling statistics about the growing concern of BYOD:
53% of information users use their own personal devices for work; install unsupported software; or use unsupported Internet based services like Dropbox, Skype, Twitter, or Facebook to help them do their jobs.
Analysts have forecasted that, by 2016, worldwide shipments of smartphones will reach 480 million, with 65% being used in bring-your-own device environments.
Security is biggest BYOD objection worldwide: it’s viewed as the #1 BYOD concern in the USA, Germany, South Korea and Australia
It’s clear that BYOD saves a company from the outset, as they no longer need to spend money on employee devices. Employees will willingly spend an average of $965 on their devices and $734 on internet data plans.
In light of this growing concern, SecureDoc has pre-boot networking authentication and mobile device management (MDM) capabilities. IT managers are given complete transparency and control while being able to access business critical information on an easily accessible mobile platform. This unique feature of SecureDoc provides the last line of defense, leveraging a multitude of encryption capabilities and key management capabilities, for end point devices in SMB and enterprise environments.
WinMagic’s SecureDoc Honored as an Information Security Magazine and SearchSecurity.com™ 2014 Readers’ Choice Award Winner
MISSISSAUGA, ON CANADA – November 13, 2014 – The readers and editors of Information Security magazine and SearchSecurity.com have selected WinMagic’s flagship data encryption solution, SecureDoc, as a 2014 Readers’ Choice Award winner in the Best of Encryption 2014 category. According to the write up announcing the winners, “Readers told [the editors] that SecureDoc not only handled most of what you’d typically encounter in an enterprise, but that it did it in a way that’s not difficult on users.”
The Information Security™ magazine and SearchSecurity.com 2014 Readers’ Choice Award winners were selected based on an extensive, in-depth survey of Information Security ™ magazine and SearchSecurity.com readers. The survey included more than 1,700 information security executives and managers, who were asked to assess and rate products deployed within their organizations from a listing of more than 400 products spanning 22 product categories.
Success With Social Media
WinMagic is dedicated to providing optimized security and thought leadership for our Partner community. In efforts to continuously provide the most relevant industry related content and material to our partners, WinMagic has increased its efforts to collaborate with Partners in Social Media.
Partners are invited to share and make use of relevant industry content by connecting to our social media feeds.
- Connect to any of WinMagic Corporate Social Media leverage these feeds by using the below hashtags to find indexed items for content sharing.
- a. Search #WMITBuzz for newsworthy articles on what is happening around the world in information technology. Become part of the conversation by sharing news with #WMITBuzz in your tweet.
- b. Search #SecureSpeak for an index to all of our WinMagic blog links.
- On LinkedIn, join the WinMagic Partner Network group to receive partner directed information. Inform your WinMagic representative when doing so as this is a closed group and is exclusive only to WinMagic Partners.
- Participate in WinMagic Social Media Boot Camp. This is an online based training that equips partners with WinMagic tools and techniques by walking partners through popular social media channels in an easy to follow format. This training is necessary before beginning on any social media campaign building with WinMagic.
- Social Media Campaign Development is offered to active partners who have participated in training. WinMagic personally works with your Marketing team to develop social media campaigns to collaboratively support lead generation efforts.
Should you have any questions on how to get started with social media, reach out to your WinMagic representative or email firstname.lastname@example.org.
eBook Alert—Five Observations Given The Recent Flood of Retail Data Breaches
“Retailers have reason to be scared. The spate of data breaches is relentless and unforgiving,” is the staggering lesson that our newest ebook, Five Observations Given The Recent Flood of Retail Data Breaches, demonstrates. The challenges of the retail landscape are evident:
In late 2013, Target revealed a major breach that ultimately was believed to affect as many as 110 million customers – attackers stole credit and debit card information, as well as names, mailing addresses, phone numbers and email addresses…
Across the pond, U.K. shoe store Office advised its customers in May 2014 to change their passwords for their online accounts after discovering they suffered a security breach, exposing customers’ names, addresses, phone numbers, and email addresses.
Data breaches such as the above mentioned, illustrate a growing concern of compliance and brand security. Businesses who do not take action in the retail space to ensure that their consumer’s data is protected expose themselves to potentially great losses financially, legally and in reputation.
Directly from WinMagic’s executive and engineering teams, the following observations and lessons for retailers facing the uncertain landscape is discussed in-depth:
- Breaches are inevitable
- Don’t merely rush to fix what caused the most recent breach
- PCI Compliance is not nearly enough
- Consider a company’s risk management profile
- Evaluate the entire security posture for your company