COMBINING ISMS WITH STRATEGIC MANAGEMENT: THE CASE OF BYOD
|
|
|
- Gerald Randall
- 9 years ago
- Views:
Transcription
1 8th IADIS International Conference Information Systems 2015 COMBINING ISMS WITH STRATEGIC MANAGEMENT: THE CASE OF BYOD Martin Brodin University of Skövde Box 408, S Skövde, Sweden ABSTRACT Bring Your Own Device (BYOD) (where employees use their private devices for work) causes problems for organisations since their management systems are seldom designed for this purpose. If BYOD is not adequately regulated, many security and privacy issues may result. This paper proposes an analysis-design-action framework for designing a suitable security management strategy by combining Johnson and Scholes strategic management model with the ISO/IEC series. KEYWORDS ISO/IEC series, BYOD, Information Security Management, Strategic Management 1. INTRODUCTION ISO/IEC series focus on what to do when it comes to information security management (ISM), not how it can be done. The step from knowing what to do to understand how to do it has proved to be overly complex and costly for many organisations (Gilles, 2011). The ISO/IEC series is intended to assist organizations of all types and sizes with implementation and operation. Through the use of the standards, organizations can develop and implement a framework for managing the security of their information assets, it can also be used to prepare for an independent assessment (ISO/IEC 27000, 2014). Although the standard is general and can be applied to different organisations in different situations it may cause some problems. A general problem with information security management standards are the focus on the existence of policies and processes, and not how they can be accomplished in practice (Siponen, 2006). When dealing with a specific problem, standards are too general to easily be applied (Doherty & Fulford, 2005). In the last years evolution of mobile devices has gone in a high-speed, the devices are getting more and more like computers. Organisations are having a hard time to keep up with this pace; at the same time the demands from users, to get the newest devices to make their job easier, are increasing. When organisations fail to adopt the latest technology, more and more users start to bring their personal devices and use them in the work. This trend is called Bring Your Own Device, or simply BYOD, and is in many ways the opposite to popular information management approaches; which strive for standardization, consolidation and reduction of complexity (Disterer & Kleiner, 2013). At the same time it is important to find the right model for governance since 86 % of the costs connected with BYOD adoption are non-hardware (Barbier, et al., 2012).This is not a security or technicians decision, it is something that has to be decided by senior management (Borrett, 2013; Ring, 2013). This article will introduce a method to adopt to phenomenon like BYOD into an organisation with the help from ISO/IEC series and strategic management. The work is based on a literature study in the field of BYOD. The research question is: RQ: How can BYOD be adopted to an organisation? In section 2 a short introduction to BYOD is presented while section 3 discusses how mobile devices and BYOD are managed in ISO/IEC series. In section 4 a model for strategic management is introduced and section 5 proposes a framework for adapting to BYOD. 161
2 ISBN: BRING YOUR OWN DEVICE BYOD is growing fast and by 2016 will 38% of companies stop providing their employees with devices, according to a survey by Gartner, and the predicted number for 2017 is 50% (van der Meulen & Rivera, 2013). Some major companies already got their own bring-your-own-device program, for instance Intel got personal devices involved in their program (Miller & Varga, 2011). However, many organisation do not have a strategy for devices or got old strategies that are ignored by a lot of the employees. Harris et al. (2012) found in their study that 36% of employees stated that they do not care about their organisations current policies and will use what they feel is right for them. Without clear, communicated strategies and education, there is a great risk that a lot of security issues will occur (Silic & Back, 2014; Walters, 2013). By highlighting the problem and make a strategy for BYOD organisations can get the benefits and at the same time reduce the risks. By allowing BYOD organisations hope to gain one or more benefits; the top benefits are increased productivity, improved flexibility and high level of user satisfaction (Miller & Varga, 2011). Another benefit that is mentioned when talking about BYOD is cost savings, as the user will take some of the cost from the device budget (Buchholz, 2012). Although there has been studies which show that cost savings from devices get eaten by increased cost to manage and secure the new IT environment (Harris et al. 2012; Walters, 2013). Risks that commonly are connected to BYOD are decreased control and security. When the device is private the employee will keep it even after the employment, but what will happen to organisational data (Walters, 2013)? Even if the former employee will delete or keep all data safe, at some point the device will end its life, what then? Analysis of information remaining on disks offered for sale on the second-hand market showed that 47% of the readable disks could be easily recovered (Jones et al. 2012). Even if the data is removed from the disk it can still be recovered. With no or little control over the device, it is hard to force updates and make sure that the antivirus program is up to date (Morrow, 2012). It is likely that a private device that is used for work purpose as well will be managed as other private devices (Disterer & Kleiner, 2013). A survey by Skype, Symantec and Tom Tom revealed that 40 % of users do not update their software when prompted to do so (Skype et al. 2012). Another study concluded that less than half of all devices in the BYOD category got at least the most basic protection (Camp, 2012). In order to identify poblems and benefits with BYOD, a systematic literature review was conducted on BYOD (in WorldCat, ACM, IEEE, ScienceDirect, Academic Search Elite, Web of Knowledge, Springer and Emerald). The review showed that research studies with focus on management for adoption to BYOD, from it first appears to fully implemented and supported, is missing. There are studies that point out benefits (Barbier, et al., 2012; Miller & Varga, 2011; Singh, 2012), threats (Disterer & Kleiner, 2013; Morrow, 2012; Pettey & Van Der Meulen, 2012), solutions to part of the problem (Allam, et al., 2014) and importance of policies (Gatewood, 2012; Oliver, 2012; Wong, 2012). 3. THE ISO/IEC SERIES ISO (International Organization for Standardization) is an independent, non-governmental membership organization and the world's largest developer of voluntary International Standards, supported by 165 countries. The series are developed in cooperation with IEC (International Electrotechnical Commission) and are still under development. ISO/IEC series is a standard for information security management systems, which is defined in ISO/IEC 27000: An Information Security Management System (ISMS) consists of the policies, procedures, guidelines, and associated resources and activities, collectively managed by an organization, in the pursuit of protecting its information assets. An ISMS is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization s information security to achieve business objectives. (ISO/IEC 27000, 2014) The established standards in the series that are of interest in an adoption to BYOD are shown in table
3 8th IADIS International Conference Information Systems 2015 Standard ISO/IEC ISO/IEC ISO/IEC ISO/IEC Table 1. ISO/IEC standards of interest in this article. About Information security management systems -- Overview and vocabulary Information security management systems -- Requirements Code of practice for information security controls Information security management system implementation guidance ISO/IEC defines terms that are used in the series and provides an overview of information security management systems. ISO/IEC specifies requirements for the establishment, implementation, maintenance and continuous improvement of an information security management system. ISO/IEC also includes requirements for the assessment and processing of information security risks. ISO/IEC provides best practice recommendations on information security management and ISO/IEC gives some guidance for implementation. ISO/IEC (2013) state that the organisation shall determine the external and internal issues that are relevant to its purpose and that affect the intended results when it comes to security. It is also important to understand which stakeholders are relevant and which of these stakeholder requirements that are relevant to information security. Senior management are responsible for information security policy, it is up to date and communicated in the organisation. When planning, it is important to prevent and reduce the unwanted effects and assess whether the measures had the intended effect. 3.1 BYOD in ISO/IEC The ISO/IEC has two advices for BYOD: separate private and professional use and sign an agreement where the user more or less waives his rights. The standard also gives some code of practice for mobile devices in general, which of some can be adopted to BYOD, see table 2. Table 2. Mobile device guidelines that can be applied to BYOD. Advice in ISO/IEC Register all mobile devices All devices shall have physical protection List accepted versions and prompt for updates. Limit access to information Controlling access Protection against virus Backup How to manage with BYOD Access policy BYOD policy IT-policy Technical Technical IT-policy IT-policy The standard also present guidance for the introduction of teleworking, which also can be applied to BYOD. Things that should be considered for teleworking, and also for BYOD: Security requirements for communication, with regard to remote connection. Use of virtual desktop to avoid processing of information on private devices. How to deal with the possibility of family and friends are using the same device. Access from private networks. The right to access private devices during investigations and updates. Does the licenses allow use on private devices? Requirements for anti-virus and firewall. 4. A MODEL FOR STRATEGIC MANAGEMENT Strategic management can be summarized in three steps; strategic analysis, strategic choice and strategic implementation, each step consists of several activities. Figure 1 is not a picture of what it looks like in practice, nor an ideal way to work. It is more a model to be used when thinking through strategic problems. 163
4 ISBN: Figure 1. Elements of strategic management, adapted from Johnson and Scholes (1993). The starting point is the strategic analysis where the management has to look deeper into the culture, stakeholder expectations, resources, strategic capability and the environment. What opportunities and threats are there? Analyses that can be used here are: Culture and stakeholder expectations Cultural context analysis identify taken-for-granted beliefs from both in- and outside. Stakeholder analysis - who has an interest in and expectation of the organisations performance? Business ethics how the organisation influence the behaviour and values of people and society. Resources and strategic capability Resource audit identify available resources to support the strategy. Value chain analysis how resources are being utilised, controlled and linked together. Comparison and balance of strategic capability against industry norm, best practise or historical data. Identification of key issues summarization of performed analyses. The environment Identify the status of the environment, static or about to change. What elements has affected the development and performance in the past? Identify key forces. Strategic position how does the organisation stand against competitors? When all analyses are done, it is time for strategic choice; develop, evaluate and select a strategy. While developing a new strategy, it is important to get the answers to three questions regarding the development: 1. What basis? 2. Which direction? 3. How? When strategic options are identified, they should be evaluated; useful criteria for evaluation is suitability, feasibility and acceptability. After evaluating the strategies a choice has to be made, helpful analyses here can be: 164
5 8th IADIS International Conference Information Systems 2015 Profitability analysis - if financial return is very important. Cost/benefit analysis is it worth it? Shareholder value analysis how and where are the real value, changes from old strategy? Finally, the strategy has to be implemented in the organisation. Essential for the implementation is planning: 1. Structure Who is in charge and who is accountable? 2. Project plan Ensure the implementation goes as planned. 3. Implement! 5. A FRAMEWORK FOR BYOD ADOPTION TO A MANAGEMENT SYSTEM Using a model for strategic management in the BYOD implementation gives a clearer picture of what needs to be done. By adapting the model to ISO/IEC series, many of the security concerns around BYOD will be managed. Adopting BYOD does not necessarily represent a strategic change in business direction for an organisation. However, it may have implication on strategic information management and ISM, which is why the model has to be modified to suit this purpose. This framework gives both the security and strategic way of thinking and acting. The proposed framework is shown in figure 2 and explained in more details in this section. The main structure is from Johnson and Scholes (1993) with the security focus from ISO/IEC series. Information security management and strategic management permeate the entire framework. Figure 2. The proposed framework for BYOD adoption. Table 3 shows, which tasks should be performed at each step, the source is either ISO/IEC series (ISO) or Exploring corporate strategy by Johnson and Scholes (1993; 2012) (). 165
6 ISBN: Table 3. Tasks in the proposed framework, italic text show main contributions from each source. Tasks Source Category Analysis Environmental analysis Risk assessment Business ethics Stakeholder analysis Cultural context analysis Information classification Resource audit Value chain analysis GAP analysis Design Cost/benefit analysis Shareholder value analysis Risk elimination Development of the strategy Selection Action Planning & allocating resources Risk assessment for implementation Managing change Evaluation ISO ISO and ISO ISO and ISO ISO and ISO ISO and 5.1 Analysis Environment Environment Expectations Expectations Expectations Resources & Capability Resources & Capability Resources & Capability Resources & Capability Option Option Development Development Selection Planning Planning Implementation Evaluation During the analysis phase a number of analyses will be conducted and summarised in order to provide a picture of the present state in the organisation. The organisation has to determine which issues that are relevant and affects overall strategy and information security (ISO/IEC 27001, 2013). It is also necessary to analyse the effect on culture, strategic capability and organisational goals (Johnson, et al., 2012). The environmental analysis includes identification of the status of the organisation, important elements for development and key forces. The analysis phase ends with a GAP analysis where the present state compares with the desired state, which is set by the management or from best practice. Johnson and Scholes (1993; 2012) model leaves out information classification and risk assessment important parts of a BYOD adoption. On the other hand; ISO/IEC series misses cultural context analysis and business ethics. 5.2 Design The design phase starts with more analyses and continues with the development of strategies. Updating current policies is a very important step in this phase (Gatewood, 2012; Harris, et al., 2012; Montaña, 2005; Oliver, 2012; Simkin, 2013; ISO/IEC 27001, 2013; Wong, 2012; Yang, et al., 2013). The information security policy should address the requirements derived from the business strategy, regulations, contracts, and the current, and expected, overall threat (ISO/IEC 27002, 2013). A Cost/Benefit analysis will be performed, but since financial return is not the main focus a profitability analysis will not be necessary. The main contribution from ISO/IEC series here is the risk elimination; Johnson and Scholes (1993; 2012) add a focus on the benefits and values for shareholders. 5.3 Action When turning the strategy into action it is, according to ISO/IEC (2013), important to perform risk assessment. This is done associated with the planning of the implementation. When planning the implementation, an education for the employees should be planned in conjunction with implementation 166
7 8th IADIS International Conference Information Systems 2015 (ISO/IEC 27002, 2013). Organisation structure and design, which appear in Johnson and Scholes (1993; 2012) model is left out because a reorganisation is not necessary for this kind of adaptation. After the implementation it is very important to evaluate if the strategy delivered the expected result (ISO/IEC 27001, 2013). 6. CONCLUSION BYOD is a phenomenon that is not well managed in business management systems and creates concerns among security experts and IT technicians. It is time for the senior management to act and get a structure so they can determine how BYOD should be handled in the business. Without a strategic decision, BYOD will exist in the organisation but unregulated. This may lead to information being compromised and without control. As with any strategic change, the work has to be methodical and with substance behind the decisions to be sustainable. In this case, information security plays an important role and the strategic work need support from information security management. The proposed framework combines the strategic management process with the information security management from ISO/IEC series. Even though BYOD is used as an example in this paper, the framework can be used to any adoption to new phenomenon that not fit into the existing management system. Future work should focus on further analysing and extending this framework and evaluate it in practice. A way to extend the framework is to develop guidelines for BYOD or similar phenomena. REFERENCES Allam, S., Flowerday, S. V. & Flowerday, E., Smartphone information security awareness: A victim of operational pressures. Computers & Security, Volym 42. Barbier, J. et al., Byod and Virtualization: Top 10 Insights from Cisco IBSG Horizons Study, s.l.: CISCO IBSG Horizons. Borrett, M., Compliance: keeping security interest alive. Computer Fraud & Security, 2013(2), pp Disterer, G. & Kleiner, C., BYOD Bring Your Own Device. Procedia Technology, Volym 9, pp Doherty, N. F. & Fulford, H., Do information security policies reduce the incidence of security breaches: an exploratory analysis. Information resources management journal, 18(4), pp Gatewood, B., The Nuts and Bolts of Making BYOD Work. The Information Management Journal, Volym 46, pp Gilles, A., Improving the quality of information security management systems with ISO TQM Journal, 23(4), pp Harris, J., Ives, B. & Junglas, I., It consumerization: When gadgets turn into enterprise IT tools. MIS Quarterly Executive, Volym 11, pp ISO/IEC 27000, Information security management systems Overview and vocabulary. ISO/IEC 27001, Information technology -- Security techniques -- Information security management systems -- Requirements. ISO/IEC 27002, Information technology -- Security techniques -- Code of practice for information security controls. Johnson, G. & Scholes, K., Exploring corporate strategy. Hemel Hempstead: Prentice hall. Johnson, G., Whittington, R. & Scholes, K., Fundamentals of strategy. 2nd edition red. Harlow: Pearson. Miller, R. E. & Varga, J., Benefits of Enabling Personal Handheld Devices in the Enterprise, u.o.: Intel Corporation. Montaña, J. C., Who Owns Business Data on Personally Owned Computers. Information Management Journal, Volym 39, pp , 42. Morrow, B., BYOD security challenges: control and protect your most sensitive data. Network Security, pp Oliver, R., Why the BYOD boom is changing how we think about business it. Engeneering and technology, 7(28). 167
8 ISBN: Pettey, C. & Van Der Meulen, R., Gartner identifies three security hurdles to overcome when shifting from enterprise-owned devices to BYOD. [Online] Available at: [Accessed 29 Oktober 2014]. Ring, T., A breach too far?. Computer Fraud & Security, 2013(6), pp Simkin, S., Cisco security intelligence - Annual security report & Cisco connected world technology. [Online] Available at: ns1120/asr_ccwtr_summary.pdf [Accessed 29 Oktober 2014]. Singh, N., B.Y.O.D. Genie Is Out Of the Bottle Devil Or Angel. Journal of Business Management & Social Sciences Research (JBM&SSR), 1(3). Siponen, M., Information security standards focus on the existence of process, not its content. Communications of the ACM, 49(8), pp Wong, W., BYOD: The Risks of Bring Your Own Device: Five things to keep in mind when it comes to employees using their own hardware in the workplace. Risk Management, 59(9). Yang, A. T., Vlas, R., Yang, A. & Vlas, C., Risk Management in the Era of BYOD: The Quintet of Technology Adoption, Controls, Liabilities, User Perception, and User Behavior International Conference on Social Computing (SocialCom), IEEE, pp
MANAGEMENT ISSUES FOR BRING YOUR OWN DEVICE
MANAGEMENT ISSUES FOR BRING YOUR OWN DEVICE Martin Brodin, University of Skövde, [email protected] Jeremy Rose, University of Skövde, [email protected] Rose-Mharie Åhlfeldt, University of Skövde, [email protected]
BYOD VS. CYOD WHAT IS THE DIFFERENCE?
9th IADIS International Conference Information Systems 2016 BYOD VS. CYOD WHAT IS THE DIFFERENCE? Martin Brodin University of Skövde Box 408, S-541 28 Skövde ABSTRACT During the last years mobile devices
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
Log management and ISO 27001
Log management and ISO 27001 Rakesh Maheshwari STQC Directorate Department of Information Technology Ministry of Communications & IT [email protected] Log management Log management is the process of generating,
Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1
Cloud Computing and Privacy Toolkit Protecting Privacy Online May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Table of Contents ABOUT THIS TOOLKIT... 4 What is this Toolkit?... 4 Purpose of this Toolkit...
ISO 27001: Information Security and the Road to Certification
ISO 27001: Information Security and the Road to Certification White paper Abstract An information security management system (ISMS) is an essential part of an organization s defense against cyberattacks
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
Information Security Incident Management Policy September 2013
Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective
WHITE PAPER BYOD AND GROUP COLLABORATION
WHITE PAPER BYOD AND GROUP COLLABORATION How to Collaborate with Ease on Any Device INTRODUCTION With 65% of white-collar workers requiring mobile connectivity to do their jobs i and 81% of employed adults
Hosted Desktop for Business
Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy
An Overview of ISO/IEC 27000 family of Information Security Management System Standards
What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
BYOD: Moving toward a More Mobile and Productive Workforce
Montana Tech Library Digital Commons @ Montana Tech Business & Information Technology Faculty Scholarship 2013 BYOD: Moving toward a More Mobile and Productive Workforce D. Lance Revenaugh, Ph.D. Montana
ISO 27000 Information Security Management Systems Foundation
ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality
Risk Management in the Era of BYOD
Risk Management in the Era of BYOD - The Quartet of Technology, Controls, Liabilities and User Perception T. Andrew Yang University of Houston-Clear Lake 2700 Bay Area Blvd Houston, Texas 77058, USA [email protected]
Benchmark of controls over IT activities. 2011 Report. ABC Ltd
www.pwc.com/cy Benchmark of controls over IT activities 2011 Report ABC Ltd... 2012 Scope and approach We wish to provide you with our IT Benchmarking report over IT activities at ABC Ltd (the Company)
MAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS
BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS Damian Bach AirWatch Session ID: SPO-T038 Session Classification: Intermediate Current & Future Mobile Landscape Number of mobile
CONSOLIDATED VERSION IEC 62304. Medical device software Software life cycle processes. colour inside. Edition 1.1 2015-06
IEC 62304 CONSOLIDATED VERSION Edition 1.1 2015-06 colour inside Medical device software life cycle processes INTERNATIONAL ELECTROTECHNICAL COMMISSION ICS 11.040 ISBN 978-2-8322-2765-7 Warning! Make sure
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
Information Security Risks when going cloud. How to deal with data security: an EU perspective.
Separating fact from fiction about new software licensing /SaaS/ cloud computing models: advantages, disadvantages and ethical implications. Information Security Risks when going cloud. How to deal with
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
Professional Diploma in Marketing Syllabus
Professional Diploma in Marketing Syllabus 05/06 www.cim.co.uk/learningzone 1: Marketing Research & Information Aim The Marketing Research and Information subject covers the management of customer information
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Information technology Security techniques Code of practice for information security controls
INTERNATIONAL STANDARD ISO/IEC 27002 Second edition 2013-10-01 Information technology Security techniques Code of practice for information security controls Technologies de l information Techniques de
Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace
Everything You Need to Know About Effective Mobile Device Management mastering the mobile workplace Table of Contents Introduction... 3 1. What exactly is Mobility Management Anyway?... 4 Impenetrable
Compulsory Course: Strategic Management Semester: 3 rd
PROGRAMME: Interdepartmental Programme of Postgraduate Studies in Business Administration (M.B.A.) Instructors: Demetres Subeniotis Professor Off:206 tel: 2310 891 580 e-mail : [email protected] Compulsory
THE FUTURE OF ENTERPRISE MOBILITY
THE FUTURE OF ENTERPRISE MOBILITY Filip Lindwall and Sebastian Thesleff, Industrial Engineering and Management, Lund University, Faculty of Engineering, May, 2013 Mobile computing is forcing the biggest
Is your business secure in a hosted world?
Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer
IT Security Management 100 Success Secrets
IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management
How To Make Bring Your Own Device A Plus, Not A Risk
FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK
Issues in Information Systems Volume 15, Issue I, pp. 81-87, 2014
SECURITY REQUIREMENTS IN SOCIAL NETWORKS Mehdi Sagheb-Tehrani (PhD), Columbus State University, [email protected] Arbi Ghazarian (PhD), Arizona State University, [email protected] ABSTRACT
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Protection in the Age of BYODs 1.0 As the workplace
Networked Systems Security
Unit 32: Networked Systems Security Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose J/601/7332 BTEC National The aim of this unit is to ensure learners know about the
The Role of Information Technology Studies in Software Product Quality Improvement
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
Strategic Planning. Credit value: 15 Guided learning hours: 45. Unit aim. Unit introduction
22727C Strategic Planning Unit code: QCF Level 7: H/602/2330 BTEC Professional Credit value: 15 Guided learning hours: 45 Unit aim This unit provides the learner with an understanding of how to review
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence
BYOD AND ME How cell phone hacking effects your business! Richard Rigby CEO Wraith Intelligence 90% of companies will offer BYOD, or bring-your-own-device options to employees by 2014, according to Gartner.
NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0
NOS for IT User and Application Specialist IT Security (ESKITU04) November 2014 V1.0 NOS Reference ESKITU040 ESKITU041 ESKITU042 Level 3 not defined Use digital systems NOS Title Set up and use security
Guardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
Quick Guide: Selecting ICT Tools for your Business
Quick Guide: Selecting ICT Tools for your Business This Quick Guide is one of a series of information products targeted at small to medium sized businesses. It is designed to help businesses better understand,
Outsourcing and Information Security
IBM Global Technology Services Outsourcing and Information Security Preparation is the Key However ultimately accountability cannot be outsourced February 2009 page 2 1. Introduction 3 1.1 Reason for outsourcing
Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.6, No.4, 2015
A Review of Impacts of Bring Your Own Device (BYOD) and Nomadic Computing on Enterprise Security Policies Compliance: The Case of Higher Learning Institutions in Kenya Peter Namisiko 1* Dr. William Sakataka
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
QuickBooks Hosting Services QuickBook Hosting Provider SapienceCloud.com
QuickBooks Hosting Services QuickBook Hosting Provider SapienceCloud.com If you are a professional accountant, Sapiens is the leading QuickBooks Cloud Hosting. It offers a cloud QuickBooks Hosting at very
Information Security Management System and Certification for VAS and Data Provider in Telecom Industry: A Case Study
CASE STUDY Information Security Management System and Certification for VAS and Data Provider in Telecom Industry: A Case Study 1 Information Security Certification for a premier VAS and Data Solution
I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure 2015 1
I.T. Security Specialists Cyber Security Solutions and Services Caretower Corporate Brochure 2015 1 about us As an independent IT security specialist, with over 17 years experience, we provide tailored
IT Tools for SMEs and Business Innovation
Purpose This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help SMEs better understand, and take advantage of, new information
Bring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT
Is securing personal information a priority? Reassure clients and achieve data protection compliance with BS 10012
Is securing personal information a priority? Reassure clients and achieve data protection compliance with BS 10012 Make protection of personal information your priority and safeguard your reputation. Comply
Server and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize
Server and Storage Virtualization. Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at:
www.transition-support.com
Can we include all products and services in the QMS but limit the scope of registration? According to ISO/TC 176/SC 2/N 524, organizations are not obliged to include all the products that it provides within
FINAL DOCUMENT. Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Part 1: General Requirements
GHTF/SG4/N28R4:2008 FINAL DOCUMENT Title: Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Authoring Group: GHTF Study Group 4 Endorsed by: The Global Harmonization
How To Protect Your Computer System From Being Hacked
INTERNATIONAL STANDARD ISO/IEC 27002 Second edition 2013-10-01 Information technology Security techniques Code of practice for information security controls Technologies de l information Techniques de
2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn
2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn Contents Contents 1 Introduction 1.1 Version History 1.2 Objective 1.3 Target group 1.4 Application
Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project
Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Introduction This Advice provides an overview of the steps agencies need to take
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
Strategic Marketing Management
Unit 7: Strategic Marketing Management Unit code: QCF Level 7: Y/602/2065 BTEC Professional Credit value: 10 Guided learning hours: 30 Unit aim This unit provides the learner with the understanding and
Digital Marketplace - G-Cloud
Digital Marketplace - G-Cloud CRM Services Core offer 9 services in this area: 1. Dynamics CRM Upgrade Services Utilising this service, Core will undertake an evaluation of your current CRM platform. We
Phone: +44 20 8123 2220 Fax: +44 207 900 3970 [email protected] https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
Cybersecurity Strategy
SYSTEM SOFT TECHNOLOGIES Cybersecurity Strategy Overview With the exponential growth of cyberspace over the past two decades has come increasing risk of data security breaches involving sensitive and private
The evolution of the internet Welcome to the internet of things. enterprise.bcs.org
The evolution of the internet Welcome to the internet of things enterprise.bcs.org 02 The evolution of the internet Welcome to the internet of things Introduction As technology developments continue to
How to make your business more flexible & cost effective? Remote Management & Monitoring Solutions for IT Providers
How to make your business more flexible & cost effective? Remote Management & Monitoring Solutions for IT Providers contents 01 Current situation of the IT Channel 02 Market Trends 03 What would be the
Achieving Compliance with the PCI Data Security Standard
Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),
Security Standards. 17.1 BS7799 and ISO17799
17 Security Standards Over the past 10 years security standards have come a long way from the original Rainbow Book series that was created by the US Department of Defense and used to define an information
THE WALTER AND ELIZA HALL INSTITUTE OF MEDICAL RESEARCH POSITION DESCRIPTION
THE WALTER AND ELIZA HALL INSTITUTE OF MEDICAL RESEARCH POSITION DESCRIPTION POSITION TITLE: Head, Information Technology Services DIVISION / DEPARTMENT: Information Technology Services DATE: 2 June 2009
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere
Remote IT Support. What is RITS?
Remote IT Support Many businesses, charities and other organisations rely heavily on their computer systems. We are committed to providing you with a fast response to problems as they occur, and working
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in
This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in how enterprises look at basic things like email collaboration
EVOLUTION OF NETWORKED STORAGE
EVOLUTION OF NETWORKED STORAGE Sonika Jindal 1, Richa Jindal 2, Rajni 3 1 Lecturer, Deptt of CSE, Shaheed Bhagat Singh College of Engg & Technology, Ferozepur. [email protected] 2 Lecturer, Deptt
ISO 27001 Gap Analysis - Case Study
ISO 27001 Gap Analysis - Case Study Ibrahim Al-Mayahi, Sa ad P. Mansoor School of Computer Science, Bangor University, Bangor, Gwynedd, UK Abstract This work describes the initial steps taken toward the
