Who is putting security at risk? It might be your CXOs…

A new report from MobileIron, “Trouble at the Top,” is eye-popping, although perhaps not surprising to IT professionals. In fact, it might provide very helpful data in making your case for security policies within your organization.

Between February and March 2020 Vanson Bourne interviewed 300 enterprise IT decision-makers and 50 C-level executives in Europe, UK, and the US regarding their organizations’ mobile security protocols.

C-Suite executives are highly targeted for cybersecurity attacks, including phishing.

Yet “76% of C-level executives admitted to requesting to bypass one or more of their organization’s security protocols” during the last year, per the findings.

In a note of irony for IT professionals, “Almost three in four (72%) IT decision-makers also claimed the C-suite is the most likely to forget or need help with resetting their passwords,” writes ZDNet, quoting from the MobileIron study.

MobileIron’s overall point is that employees need the right tools to be secure and productive at the same time. Or, as we would say, security measures cannot afford to impair usability or people will conjure up a way around them.

There is much more in the study. You can register for the download of MobileIron’s “Trouble at the Top” report here.

-Maureen

ILTA Webinar: Mobile, Secure NetDocuments Workflows: NetDocuments® DMS + LINK Encrypted App

Do you use NetDocuments® DMS today or are you evaluating NetDocuments? If you are looking for an encrypted container app approach for mobile NetDocuments DMS, our LINK app may provide that extra client-side security that you are looking for.

Date and time: Monday, February 11, 2019, Noon EST

Watch a recording of the demo here

Continue reading

Hacking is a booming business, and it’s time for a disruption – CSO Online

By Mobile Helix CEO and Co-founder, Seth Hallem

Hackers are siphoning billions from the global economy each year by stealing data for profit. However, in spite of this rising threat, enterprises continue to make the same mistakes over and over again. It is time to change our assumptions and to re-think how we protect sensitive data.

Hacking is a booming business. Business has been good for several years now. Data breaches are at all-time highs. Cyber-attacks are skyrocketing, and ransomware is a growing fad. And the best news of all is that the same old tricks (see XSS, SQL Injection, SPAM ….) are still working just as well as they always have. How is it possible that a business that was estimated to cost the global economy $450 billion dollars is continuing to grow? That is a lot of money diverted to criminals in lieu of legitimate participants in our global economy.

Continue reading

What CISOs must learn from Bitcoin and a research team at Georgia Tech

By Seth Hallem, originally published in HelpNetSecurity, Sept. 16, 2013

It has been an eventful time in the mobile world with two recent breaking stories revealing vulnerabilities in the security infrastructure for Android and iOS respectively. While vastly different in their nature, both point to a fundamental lesson that CISOs in an increasingly mobile world cannot ignore – when it comes to encryption, read the fine print. Otherwise you may find yourself up the proverbial creek without a paddle (i.e., remediation strategy).

Continue reading

Passing Through U.S. Customs and Border Patrol with Your Smartphone? LINK App to the Rescue!

Peripatetic lawyers, take note from Friday, 1/5/2018, in the Washington Post:

“U.S. customs agents conducted 60 percent more searches of travelers’ cellphones, laptops and other electronic devices during the government’s 2017 fiscal year, according to statistics released Friday by U.S. Customs and Border Protection (CBP).

The agency said it searched 30,200 devices but the inspections affected only 0.007 percent of the 397 million travelers — including American citizens as well as foreign visitors — who arrived from abroad during the 12-month period that ended Sept 30.”1

Continue reading

The FBI Cracks the iPhone – What Can Legal IT Do? From Mobile Helix CEO

By Seth Hallem, Mobile Helix CEO and co-founder

LegalIT Insider logoOn March 28th, the Department of Justice confirmed that it had successfully unlocked the San Bernardino shooter’s iPhone 5C without Apple’s assistance. On that same day, the US government moved to vacate a California court order that had attempted to force Apple to assist in the decryption of the device. While the legal maneuverings are fascinating in their own right, the conclusion leads to an even more fascinating technology discussion – how did the FBI crack the iPhone, and what are the implications of this successful hack? Continue reading

Mobile Helix at iManage ConnectLive, May 11-12

ConnectLive_Graphic_2016_with_LINK

Continue reading

Authenticate with Biometrics

By Ilya Dreytser

ILTA Authentication with Biometrics ILTA Spring 2016

You may not want to send that second factor SMS code to your phone.

The new ILTA Spring 2016 Peer to Peer magazine is out! View the HTML5 Flipbook or download the PDF here. Don’t miss Ilya’s article on page 42.

With today’s increasingly mobile-enabled workforce, receiving secondfactor
authentication tokens by SMS (text message) or by mobile app is
becoming completely ineffective. Is it time to bring back physical secondfactor
authentication tokens? Or is it time to move on to a biometric option?

Continue reading