2012 IT Risk/Reward Barometer: UK. November *n=159

Size: px
Start display at page:

Download "2012 IT Risk/Reward Barometer: UK. November 2012 www.isaca.org/risk-reward-barometer *n=159"

Transcription

1 2012 IT Risk/Reward Barometer: UK November *n=159 Respondents are business and IT professionals from the UK and are members of ISACA. Media Inquiries: Kristen Kessinger, ISACA, , Neil Stinchcombe, Eskenzi, , 1. Please indicate whether each of these employee activities is of low risk, medium risk or high risk to an enterprise: Using his/her work address as a contact address for an online purchase Storing his/her work passwords in a file on a work-supplied Storing his/her work passwords in a file on a personal Low Risk Medium Risk High Risk 43% 42% 15% 17% 40% 44% 3% 21% 77% Clicking on an link to access an online site from a work-supplied computer or smartphone Accessing social networking sites for personal use from a work-supplied computer or smartphone 17% 53% 30% 23% 54% 23%

2 Using location-based mobile applications on a work-supplied Using a personal computer or smartphone for business /information Downloading personal files, music, apps, etc., onto worksupplied computer or smartphone Losing a work-supplied computer or smartphone Using an online file-sharing service (e.g., Dropbox or Google Docs) for work documents 29% 57% 14% 9% 36% 55% 7% 34% 59% 7% 37% 56% 5% 20% 76% 2. My enterprise allows/limits/prohibits/unsure when it comes to: Allows Limits Prohibits Unsure Using a worksupplied for personal use Using a personal mobile for work purposes Shopping online using a worksupplied Accessing social networking or daily deal sites from a worksupplied 26% 61% 13% 1% 23% 37% 40% 1% 40% 42% 18% 1% 28% 35% 37% 1%

3 Using a work address for personal online shopping or other nonwork-related activities Using an online file-sharing service (e.g., DropBox or Google Docs) for work documents 34% 27% 33% 6% 9% 16% 67% 8% 3. Which of the following do you believe is the most accurate statement about BYOD (bring your own, where employees are allowed to use personal s for work activities)? a. The benefit outweighs the risk % b. The risk outweighs the benefit % c. The risk and benefit are appropriately balanced % 4. Does your enterprise have a security policy in place for BYOD? a. Yes; it s allowed % b. Yes; it s prohibited...44% c. No.23% d. Unsure..11% 5. What benefits has your organization realized as a result of allowing employees to use their own s for work purposes? (n=34) (Note: This question was answered only by those who selected answer choice a in question 4.) Frequently cited responses include: More flexibility Greater productivity/availability Staff satisfaction Cost savings 6. Which of the following security controls does your enterprise have in place for employees personal s? (Please select all that apply.) (n=158) a. Remote wipe capability 34% b. Password management system.39% c. Encryption..44%

4 d. None of the above 41% e. Other 11% 7. Does your enterprise have a policy that prohibits traveling across country borders with business data on a mobile? a. Yes...15% b. No 72% c. Unsure.. 13% 8. Approximately what percentage of your enterprise s information security incidents do you think are the result of employees use of: (n=161) Work s for personal activities? Personal s for work activities? 0 4% 16% % 34% % 19% % 12% % 6% % 3% % 6% % 0% % 2% % 0% % 1% 100 2% 0% 9. Does your enterprise have a policy for employees use of location-based apps (e.g., Foursquare) on work-issued or BYOD s? a. Yes, and it s allowed for all staff..2% b. Yes, and it s allowed for some staff based on business need..17% c. Yes, and it s prohibited for all staff.11% d. No 45% e. Unsure..25% 10. Has your enterprise or one of its employees experienced a security issue as a result of an employee s use of geolocation? (n=158) a. Yes.2% b. No.48% c. Unsure.51%

5 11. Which of the following best describes your enterprise s cloud computing plan? (n=158) We do not use it for any IT services. We use it for low-risk, nonmissioncritical services. We use it for mission-critical services. Unsure Public cloud 59% 23% 3% 14% Private cloud 27% 32% 29% 13% Hybrid cloud 46% 20% 7% 27% 12. Which of the following do you believe to be true about private cloud, public cloud and hybrid cloud? (n=158) The benefit outweighs the risk. The risk outweighs the benefit. The risk and benefit are appropriately balanced. Public cloud 11% 67% 22% Hybrid cloud 15% 40% 45% Private cloud 56% 9% 35% 13. What is your enterprise s biggest concern about cloud computing? (n=110) Frequently cited responses include: Loss of control of the data Data security, privacy and confidentiality concerns Availability concerns Compliance issues Legal issues 14. What was the primary driver behind your enterprise s decision to use cloud computing? (n=104) Frequently cited responses include: Cost reduction Greater efficiency, flexibility and access to data To keep pace with technology 15. What percentage of your IT budget is now directed to cloud computing? (n=158) a. 0%...14% b. 1-9%...20% c %...12%

6 d %...6% e %...4% f %...2% g %...0% h %...0% i %...1% j %...0% k %...0% l. 100%...0% m. Unsure % 16. Of the following, what is your enterprise s greatest hurdle when addressing IT-related business risk? (n=158) a. Not sure how to tailor best practices to the environment...5% b. Lack of management support...11% c. Budget limits 18% d. Lack of cooperation across risk management silos..11% e. Business lines not willing to fully engage in risk management..29% f. Insufficient resources (e.g., not enough staff, time). 26% 17. Of the following, what do you feel is the most important action your enterprise can take to improve IT risk management? (n=157) a. Increase risk awareness among employees...36% b. Increase the use of best practices/frameworks.13% c. Improve coordination between IT risk management and overall enterprise risk management.28% d. Provide executive management with a single view of risk, as opposed to risk silos.19% e. Other.....4% 18. In 2013, do you expect your enterprise to increase, decrease or keep at current levels the number of staff in: (n=158) Increase Decrease Keep at Unsure current levels Information 41% 10% 42% 6% security IT risk 31% 10% 48% 11% management IT assurance 28% 12% 47% 14%

7 19. During the holiday season (November and December), how much total time do you think an average employee at your enterprise spends shopping online using: (n=149) A work-supplied computer or smartphone, at work or elsewhere? A personal computer or smartphone during work hours? 0 hours 5% 3% 1-2 hours 25% 29% 3-5 hours 19% 21% 6-8 hours 14% 12% 9-12 hours 17% 17% hours 4% 7% hours 7% 1% hours 3% 3% hours 3% 3% hours 2% 2% 50 hours or more 1% 2% 20. Compared to last year, do you think employees at your enterprise will do more, less or about the same amount of holiday shopping online during work hours? (n=152) a. More....41% b. Less... 9% c. About the same.51% 21. In terms of lost productivity, how much money (in US dollars) do you think your enterprise loses in November and December as a result of an employee shopping online during work hours (on a work-issued or personal )? (n=148) a. $0...16% b. $1-$ % c. $1,000-$4,999.11% d. $5,000-$9, % e. $10,000-$14, % f. $15,000 or more....29%

8 22. In what industry do you work? a. Finance/banking/insurance.34% b. Public accounting.4% c. Transportation/aerospace..3% d. Retail/wholesale/distribution...3% e. Government/military 9% f. Technology services/consulting.18% g. Manufacturing/engineering..7% h. Telecommunications/communications.8% i. Mining/construction/petroleum/agriculture..2% j. Utilities...3% k. Legal/law/real estate.0% l. Health care/medical/pharmaceutical.3% m. Advertising/marketing/media...3% n. Education/nonprofit..2% o. Other.3% 23. How many people are employed in your enterprise, including all branches, divisions and subsidiaries? a % b % c % d % e % f. 1,000-4, % g. 5,000-9, % h. 10,000-24, % i. 25,000-49, % j. 50,000-99,000 10% k. 100,000 or more...18% 24. Which of the following is closest to your job title? (n=158) a. External consultant...12% b. Professor/teacher....0% c. Professional....34% d. Supervisor.. 2% e. Manager...33% f. Director..9% g. Vice president....2% h. President/CEO...1% i. Other...8% Note: Due to rounding, percentages may not add up to 100.

9 About the 2012 IT Risk/Reward Barometer The annual IT Risk/Reward Barometer helps gauge current attitudes and organizational behaviors related to the risk and reward associated with the blurring boundaries between personal and work s (BYOD), cloud computing, and increased enterprise risk related to online employee behavior at peak seasonal times. The study is based on September 2012 online polling of 4,512 ISACA members from 83 countries, including 159 members in the UK. A separate online survey was fielded among 1,224 US consumers by M/A/R/C Research from 8-10 October At a 95 percent confidence level, the margin of error for the total sample is +/- 2.8 percent. To see the full results, visit

Benefits From the Internet of Things For Your Organization

Benefits From the Internet of Things For Your Organization 2014 IT Risk/Reward Barometer Latin America Results November 2014 www.isaca.org/risk-reward-barometer Number of respondents (n) = 102 Respondents are business and IT professionals who are members of ISACA.

More information

2014 ISACA IT Risk/Reward Barometer UK Consumer Results. October 2014 www.isaca.org/risk-reward-barometer

2014 ISACA IT Risk/Reward Barometer UK Consumer Results. October 2014 www.isaca.org/risk-reward-barometer 2014 ISACA IT Risk/Reward Barometer UK Consumer Results October 2014 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Aaron Berger, Ketchum,

More information

January 2016 Cybersecurity Snapshot Global Results www.isaca.org/2016-cybersecurity-snapshot Number of respondents (n) = 2,920

January 2016 Cybersecurity Snapshot Global Results www.isaca.org/2016-cybersecurity-snapshot Number of respondents (n) = 2,920 January 2016 Cybersecurity Snapshot Global Results www.isaca.org/2016-cybersecurity-snapshot Number of respondents (n) = 2,920 Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org

More information

The App Age: How Enterprises Use Mobile Applications

The App Age: How Enterprises Use Mobile Applications The App Age: How Enterprises Use Mobile Applications Introduction The mobile app market is growing steadily as businesses seek ways to innovate, create business value and engage partners and customers

More information

30 BILLION RISKS AND REWARDS OF CONNECTED DEVICES THE INTERNET OF THINGS CYBER LANDSCAPE TODAY

30 BILLION RISKS AND REWARDS OF CONNECTED DEVICES THE INTERNET OF THINGS CYBER LANDSCAPE TODAY RISKS AND REWARDS OF CONNECTED DEVICES THE HIDDEN INTERNET OF THINGS ISACA 2015 IT RISK / REWARD BAROMETER The Internet of Things paints a vision of a carefree, seamlessly connected world where interconnected

More information

The Security Impact of Mobile Device Use by Employees

The Security Impact of Mobile Device Use by Employees The Security Impact of Mobile Device Use by Employees Sponsored by Accellion Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report The Security

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:

More information

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer Risks and Rewards of the Internet of Things Findings From ISACA s 2013 IT Risk/Reward Barometer The world is increasingly being populated by connected devices that collect and share information over the

More information

MOBILE BANKING USER GUIDE

MOBILE BANKING USER GUIDE MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the

More information

Tuesday, June 5, 12. Mobile Device Usage

Tuesday, June 5, 12. Mobile Device Usage Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.

More information

BYOD: Bring Your Own Policy. Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works.

BYOD: Bring Your Own Policy. Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works. BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works. BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already

More information

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) JULY 2014 INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on

More information

Document Sharing on Mobile Devices: Securing Productivity on the Go!

Document Sharing on Mobile Devices: Securing Productivity on the Go! Document Sharing on Mobile Devices: Securing Productivity on the Go! Table of Contents Introduction: Enterprise Documents Go Mobile...3 Solving the Secure Data Conundrum...3 Ensuring Productivity in the

More information

Document Sharing on Mobile Devices. Securing Productivity on the Go! www.maas360.com

Document Sharing on Mobile Devices. Securing Productivity on the Go! www.maas360.com Document Sharing on Mobile Devices Securing Productivity on the Go! www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential

More information

Introduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov

Introduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox What is it? Why use it? Mitigating the risks of using Dropbox? Dropbox

More information

Aalborg Universitet. Cloud Governance Berthing, Hans Henrik Aabenhus. Publication date: 2013. Document Version Preprint (usually an early version)

Aalborg Universitet. Cloud Governance Berthing, Hans Henrik Aabenhus. Publication date: 2013. Document Version Preprint (usually an early version) Aalborg Universitet Cloud Governance Berthing, Hans Henrik Aabenhus Publication date: 2013 Document Version Preprint (usually an early version) Link to publication from Aalborg University Citation for

More information

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from A 5-STEP PLAN TO PREPARE FOR BYOD IN HEALTHCARE A Complimentary White Paper from A 5-step plan to prepare for BYOD in health care A Complimentary White Paper from Healthcare Business & Technology Nearly

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK Whitepaper 2 Secure File Sharing and Collaboration: The Path to Increased Productivity and Reduced Risk Executive

More information

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption! Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption Thisdocumentcontainsthenecessarystepstoencryptthecontentsofaharddrive usingbitlockerandwindows7. Thefollowinginstructionsarederivedfromdocumentationat:

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

BYOD (BRING YOUR OWN DEVICE) AND THE EVOLUTION OF TIN

BYOD (BRING YOUR OWN DEVICE) AND THE EVOLUTION OF TIN BYOD (BRING YOUR OWN DEVICE) AND THE EVOLUTION OF TIN CONTENTS 1. About this Document 2. Executive Summary 3. An Insight to BYOD in the Business World 4. What Opportunities has BYOD opened- up for IT Services?

More information

FROM TACTIC TO STRATEGY:

FROM TACTIC TO STRATEGY: FROM TACTIC TO STRATEGY: The CDW 2011 Cloud Computing Tracking Poll 2011 CDW LLC TABLE OF CONTENTS Introduction 3 Key findings 4 Planning for the cloud 16 Methodology and demographics 19 Appendix 20 Industries

More information

Mobile & Bring Your Own Device (BYOD)

Mobile & Bring Your Own Device (BYOD) www.pwc.com Breakfast session: Mobile & Bring Your Own Device (BYOD) We are in a mobile world Slide 2 Today s trends Digital commerce (business) IT outsourcing Slide 3 Today s users expectations Work-life

More information

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal

More information

How to use Google Cloud Print

How to use Google Cloud Print How to use Google Cloud Print 1 You can use your Canon printer for Google Cloud Print, following the procedures explained below. In Google Cloud Print, you will be able to print from anywhere you like

More information

The Cloud-Enabled Social Mobile Enterprise. Neil Florio, Fiberlink Andrew Borg, Aberdeen Group

The Cloud-Enabled Social Mobile Enterprise. Neil Florio, Fiberlink Andrew Borg, Aberdeen Group The Cloud-Enabled Social Mobile Enterprise Neil Florio, Fiberlink Andrew Borg, Aberdeen Group 1 Today s Agenda State of Enterprise Mobility Management (EMM) The Rise of Bring Your Own Device (BYOD) Cloud-Enabled

More information

Enterprise Mobile Apps An Opportunity to Transform

Enterprise Mobile Apps An Opportunity to Transform Enterprise Mobile Apps An Opportunity to Transform Table of Contents Enterprise Mobile Industry: An Overview Pg 2 Opportunity for Enterprise Mobile Apps Pg 3 Key Drivers for Mobile Investments Pg 3 Hurdles

More information

File Sync And Share And The Future Of Work

File Sync And Share And The Future Of Work A Forrester Consulting Thought Leadership Paper Commissioned By Dropbox March 2014 File Sync And Share And The Future Of Work Table Of Contents Executive Summary...1 Workers Are Embracing Sync And Share

More information

2014 State of Endpoint Risk. Sponsored by Lumension. Independently conducted by Ponemon Institute LLC Publication Date: December 2013

2014 State of Endpoint Risk. Sponsored by Lumension. Independently conducted by Ponemon Institute LLC Publication Date: December 2013 2014 State of Endpoint Risk Sponsored by Lumension Independently conducted by Ponemon Institute LLC Publication Date: December 2013 Ponemon Institute Research Report 2014 State of Endpoint Risk Ponemon

More information

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices

More information

Moving to the Cloud: What Every CIO Should Know

Moving to the Cloud: What Every CIO Should Know Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Samsung Mobile BYOD Index: Comparing IT and End User Outlooks on Bring Your Own Device

Samsung Mobile BYOD Index: Comparing IT and End User Outlooks on Bring Your Own Device Samsung Mobile BYOD Index: Comparing IT and End User Outlooks on Bring Your Own Device Bring Your Own Device The New Corporate Norm 2 Welcome to the new world of corporate IT Where Bring Your Own Device

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered

More information

1 P a g e. Lim Jun Yan, Undergraduate School of Information Systems Singapore Management University

1 P a g e. Lim Jun Yan, Undergraduate School of Information Systems Singapore Management University 1 P a g e Lim Jun Yan, Undergraduate School of Information Systems Singapore Management University Trust is to rely upon or place confidence in someone or something. However, this is not a definition that

More information

What Is BYOD? Challenges and Opportunities

What Is BYOD? Challenges and Opportunities Wor k s pac es Mobi l i t ysol ut i ons Bl uewi r esol ut i ons www. bl uewi r e. c o. uk What Is BYOD? Challenges and Opportunities What is BYOD How Secure is Your BYOD Environment? Bring your own device

More information

5 Magical Things. Why Nomadesk is the right product for you

5 Magical Things. Why Nomadesk is the right product for you 5 Magical Things Why Nomadesk is the right product for you 2 November 2015 What is Nomadesk? secure file sharing and synchronisation designed for business professionals Zero thought, in-the-flow file sharing,

More information

Company size matters: Perspectives on IT Governance

Company size matters: Perspectives on IT Governance www.pwc.com/ca/technology-consulting Company size matters: Perspectives on IT Governance versus large Canadian organizations and IT Governance PwC conducted research for the 4th edition of the IT Governance

More information

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012 Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Why the interest in Clouds? A method to avoid/defer CAPEX/OPEX and possibly accelerating implementation 2 It all started here - Timeshare Computers and

More information

Security and Compliance challenges in Mobile environment

Security and Compliance challenges in Mobile environment Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com

More information

Feature. Leveraging and Securing the Bring Your Own Device and Technology Approach

Feature. Leveraging and Securing the Bring Your Own Device and Technology Approach Feature Gaurav Priyadarshi, CISA, BS 25999 LI, ISO 27001 LA, ITIL V3, is a senior security consultant at TATA Consultancy Services, a leading IT service company with worldwide experience in the information

More information

Enterprise mobility trends 2015 and beyond

Enterprise mobility trends 2015 and beyond Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources

More information

Mobile Health Apps 101: A Primer for Consumers. myphr.com

Mobile Health Apps 101: A Primer for Consumers. myphr.com Mobile Health Apps 101: A Primer for Consumers just think APP This guide is designed to help you understand and make educated decisions about using mobile health applications ( app ). When considering

More information

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with

More information

BYOD report. Comms-care commissioned survey highlighting the change in Bring Your Own Device (BYOD) issues over the past twelve months

BYOD report. Comms-care commissioned survey highlighting the change in Bring Your Own Device (BYOD) issues over the past twelve months BYOD report Comms-care commissioned survey highlighting the change in Bring Your Own Device (BYOD) issues over the past twelve months new technologies 0833v1 BYOD report Security provisions for BYOD grow

More information

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1 Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is

More information

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology

More information

Introduction. Mobile devices have become an integral part of the everyday work environment. www. Ulistic.com 289.362.3632 info@ulistic.

Introduction. Mobile devices have become an integral part of the everyday work environment. www. Ulistic.com 289.362.3632 info@ulistic. Introduction Mobile devices have become an integral part of the everyday work environment. Everywhere you turn, you see someone using a smart phone to read email, find an unfamiliar location or communicate

More information

Enabling Growth and Driving Business Transformation. cloud

Enabling Growth and Driving Business Transformation. cloud Enabling Growth and Driving Business Transformation cloud Cloud that works for you. All Covered IT Services from Konica Minolta can cut costs and help grow your business. For IT professionals, the cloud

More information

How To Make Bring Your Own Device A Plus, Not A Risk

How To Make Bring Your Own Device A Plus, Not A Risk FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK

More information

With the adoption of the technology of Cloud Computing (Cloud. Computing), virtual desktop solutions represent one of the most

With the adoption of the technology of Cloud Computing (Cloud. Computing), virtual desktop solutions represent one of the most Virtual Desktops By: Italo E. Ayesteran R. With the adoption of the technology of Cloud Computing (Cloud Computing), virtual desktop solutions represent one of the most powerful ways to increase performance

More information

ONLINE PRIVACY POLICY

ONLINE PRIVACY POLICY ONLINE PRIVACY POLICY The City of New Westminster is committed to protecting your privacy. Any personal information collected, used or disclosed by the City is in accordance with the Freedom of Information

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Neat Cloud Service + Mobile App

Neat Cloud Service + Mobile App Getting Started with Neat Cloud Service + Mobile App Neat transforms paper and electronic documents into organized digital files that are easy to find, use, and share. Neat Cloud Service and Mobile App

More information

Xopero Backup Build your private cloud backup environment. Getting started

Xopero Backup Build your private cloud backup environment. Getting started Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...

More information

The Unintentional Insider Risk in United States and German Organizations

The Unintentional Insider Risk in United States and German Organizations The Unintentional Insider Risk in United States and German Organizations Sponsored by Raytheon Websense Independently conducted by Ponemon Institute LLC Publication Date: July 2015 2 Part 1. Introduction

More information

Managing Personal Devices in the Enterprise

Managing Personal Devices in the Enterprise WHITE PAPER AN IT MANAGER S GUIDE TO Managing Personal Devices in the Enterprise AN IT MANAGER S GUIDE TO MANAGING PERSONAL DEVICES IN THE ENTERPRISE Allowing personal smartphones does not have to be mob

More information

Installing Google Drive for Windows 7

Installing Google Drive for Windows 7 Installing Google Drive for Concept Google Drive allows you to store and synchronize your files on the web, hard drive and mobile device. Prior to installing Google Drive, it is recommended that you organize

More information

Adopting Cloud Computing with a RISK Mitigation Strategy

Adopting Cloud Computing with a RISK Mitigation Strategy Adopting Cloud Computing with a RISK Mitigation Strategy TS Yu, OGCIO 21 March 2013 1. Introduction 2. Security Challenges Agenda 3. Risk Mitigation Strategy Before start using When using 4. Policy & Guidelines

More information

The Future of Enterprise Mobility: Part II. Strategic Options for Mobile Security Firms

The Future of Enterprise Mobility: Part II. Strategic Options for Mobile Security Firms The Future of Enterprise Mobility: Part II Strategic Options for Mobile Security Firms Evolution to a Mobile World Mobile Web Compu&ng and Global IT Ecosystem 10,000,000,000 Desktop Web 1,000,000,000 PCs

More information

FOR THE FUTURE OF DATA CENTERS?

FOR THE FUTURE OF DATA CENTERS? WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? A WHITEPAPER BROUGHT TO YOU BY SEI WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? files via the Internet to a hard drive located in a

More information

WHITE PAPER SOLUTION CARD. What is Fueling BYOD Adoption? Mobile Device Accountability and Control

WHITE PAPER SOLUTION CARD. What is Fueling BYOD Adoption? Mobile Device Accountability and Control WHITE PAPER Enabling BYOD in Government Agencies with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your agency s wireless network About This White Paper This

More information

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution. Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution Global July 2012 Contents Section Slide Numbers Executive Summary 4 Market

More information

Mobility in Business Report

Mobility in Business Report Mobility in Business Report Prepared by: Citrix and Vanson Bourne www.citrix.com Executive Summary Mobility continues to change the way we do business at a dramatic rate. Ten years ago, no one was talking

More information

How To Connect Your Cloud

How To Connect Your Cloud How To Connect Your Cloud This tutorial will show you how to connect ncrypted Cloud to multiple cloud storage accounts after installation. This will allow you to apply privacy to all cloud data right from

More information

Ibrahim Yusuf Presales Engineer at Sophos ibz@sophos.com. Smartphones and BYOD: what are the risks and how do you manage them?

Ibrahim Yusuf Presales Engineer at Sophos ibz@sophos.com. Smartphones and BYOD: what are the risks and how do you manage them? Ibrahim Yusuf Presales Engineer at Sophos ibz@sophos.com Smartphones and BYOD: what are the risks and how do you manage them? Tablets on the rise 2 Diverse 3 The Changing Mobile World Powerful devices

More information

Mobile Devices in the Workplace: What Every Employer Needs to Know

Mobile Devices in the Workplace: What Every Employer Needs to Know Mobile Devices in the Workplace: What Every Employer Needs to Know Presented by: Shannon Huygens Paliotta Senior Associate, Littler Mendelson, P.C. spaliotta@littler.com (412) 201-7631 Marcy McGovern Knowledge

More information

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon

More information

Managing Cloud Data Security in Regulated Industries for 2016

Managing Cloud Data Security in Regulated Industries for 2016 Managing Cloud Data Security in Regulated Industries for 2016 November, 2015 Table of Contents I. Introduction: Security challenges in regulated industries...1 II. Cloud adoption rates by industries...1

More information

Base: All respondents 501. Fee-based service like itunes Music Store 195 39% Free service like KaZaa, Limewire, or BitTorrent 171 34%

Base: All respondents 501. Fee-based service like itunes Music Store 195 39% Free service like KaZaa, Limewire, or BitTorrent 171 34% 1) What type of service do you use to download music and/ or video files? Fee-based service like itunes Music Store 195 39% Free service like KaZaa, Limewire, or BitTorrent 171 34% None of the above 199

More information

What You Don t Know Will Hurt You: A Study of the Risk from Application Access and Usage

What You Don t Know Will Hurt You: A Study of the Risk from Application Access and Usage What You Don t Know Will Hurt You: A Study of the Risk from Application Access and Usage Sponsored by ObserveIT Independently conducted by Ponemon Institute LLC June 2015 Ponemon Institute Research Report

More information

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Sponsored

More information

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70

More information

Cloud Productivity Is Key to Success: A Survey of Young Businesses

Cloud Productivity Is Key to Success: A Survey of Young Businesses Cloud Productivity Is Key to Success: A Survey of Young Businesses Cloud Productivity Is Key to Success: A Survey of Young Businesses Executive Summary In every market in every region, launching and building

More information

10 Hidden IT Risks That Might Threaten Your Law Firm

10 Hidden IT Risks That Might Threaten Your Law Firm (Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

Mobile and BYOD Strategy

Mobile and BYOD Strategy Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring

More information

9 Ecommerce Reports to Leverage This Holiday Season

9 Ecommerce Reports to Leverage This Holiday Season 9 Ecommerce Reports to Leverage This Holiday Season 9 Ecommerce Reports to Leverage This Holiday Season According to Goldman Sachs research, digital commerce adoption and expansion is anticipated to further

More information

Your World Is on the Move

Your World Is on the Move Business White Paper Mobility Your World Is on the Move You can t afford to keep poking your fingers in the mobility dike with consumer-oriented point products from different vendors. Novell gives you

More information

DIGITAL CONSUMER SURVEY

DIGITAL CONSUMER SURVEY DIGITAL CONSUMER SURVEY PUBLISHED: SEPTEMBER 2015 RESEARCH OBJECTIVES Explore whether consumers are aware of different protection standards for traditional telecoms and OTTs Identify how much consistency

More information

IONU PRO Product Overview

IONU PRO Product Overview Quick View ü You MUST be logged in to access any information inside the IONU system. If you aren t logged in, you will not see the folders and the data and files cannot be accessed and decrypted. ü All

More information

How Technology Executives are Managing the Shift to BYOD

How Technology Executives are Managing the Shift to BYOD A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 How Technology Executives are Managing the Shift to BYOD An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the

More information

How To Use Lexmark For Business

How To Use Lexmark For Business filenshare Enterprise File Sharing and Synchronization by Perceptive Software Matthias Weber Partner Account Manager Agenda Introduction Lexmark/ Perceptive Software Business Drivers Use Cases Benefits

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

Mobile Device Security Is there an app for that?

Mobile Device Security Is there an app for that? Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach

More information

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

BYOD File Sharing Go Private Cloud to Mitigate Data Risks AN ACCELLION WHITE PAPER BYOD File Sharing Go Private Cloud to Mitigate Data Risks Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto, CA

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Policy for Associates and Contractors Version: 1.12 Status: Issued Date: 30 July 2015 Reference: 61418080 Location: Livelink Review cycle: Annual Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

Fourth Annual Benchmark Study on Patient Privacy & Data Security

Fourth Annual Benchmark Study on Patient Privacy & Data Security Fourth Annual Benchmark Study on Patient Privacy & Data Security Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Ponemon Institute Research Report

More information

The Cloud for Productivity and Mobility

The Cloud for Productivity and Mobility The Cloud for Productivity and Mobility A Guide for Small and Midsize Business As mobile work becomes the norm, turn to cloud-based solutions to extend productivity, collaboration, and business management

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Mobile Access Software Blade

Mobile Access Software Blade Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.

More information

The BYOD Survival. for Practicing Safe Mobile Collaboration

The BYOD Survival. for Practicing Safe Mobile Collaboration The BYOD Survival Guide 5tips for Practicing Safe Mobile Collaboration Personal mobile devices have infiltrated enterprise organizations all over the world, enabling everyone to work from everywhere. Industry

More information

IT Executive and CEO Survey

IT Executive and CEO Survey Mobile Consumerization Trends & Perceptions IT Executive and CEO Survey FINAL REPORT COMPARISONS: WAVES 1 AND 2 PREPARED FOR: TREND MICRO, INC. BY: DECISIVE ANALYTICS, LLC Cheryl Harris, Ph.D. Chief Research

More information

Alternative Device Integration For Enhanced Security

Alternative Device Integration For Enhanced Security Alternative Device Integration For Enhanced Security Increase security and reduce risk by using existing technology in a non-traditional fashion White Paper Author John Carney, Senior Manager, Cisco Government

More information

Privacy Issues Airports

Privacy Issues Airports Privacy and Data Breaches A GROWING AIRPORT CONCERN Dominic Nessi Los Angeles World Airports Privacy in General There is none Google and other search engines, cookies Growth of on-line commerce Social

More information

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com Total Enterprise Mobility Norbert Elek norbert_elek@hu.ibm.com www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security

More information