When you think about the things that impact daily life, what comes to mind? Is mobility at or near the top of your list? Because itâ€™s become such an â€śautomaticâ€ť part of what we do both in our personal and professional lives, itâ€™s easy to overlook. Yet the reality is that mobility touches every aspect of our lives â€” and, more importantly, is a key driver of every business these days.
Mobility has changed the way we communicate and collaborate, and has truly enhanced these aspects of business. Statistics show that 84% of employees use some kind of mobile device (smartphone, tablet or laptop) for work1, and in some companies, that number has risen to 100%. As part of our culture, business professionals expect to be able to access corporate email, files and data from anywhere any time. However, many employees are accessing this information without permission from IT, thus rendering corporate data on devices that have no security, encryption or organizational control.
As apps, iBeacons and machine-to-machine technology expand, companies must consider not only the opportunities that exist in using mobile devices but the risks that come with them. Cyber security, data breaches and data leakage are just a few of the primary security challenges. With more than 12,000 smartphones alone being lost, stolen or misplaced every day in the US2, itâ€™s clear that protecting a companyâ€™s data is everyoneâ€™s job!
Simultaneously, companies who want to maintain their competitive advantage are recognizing that opportunities abound for increased productivity and cost reduction with mobility. Meanwhile, businesses lacking a comprehensive mobile strategy may find themselves succumbing to the fate of notable giants like Kodak, Blackberry and Blockbuster who failed to leverage technology to innovate.
Mobile devices are being purchased at more than a 6:1 ratio over desktop PCs3, which coincides with the notion that todayâ€™s workforce demands data access, device freedom and the ability to work differently. Though most companies have discussed mobility in some form, many place it low on their priority list. In reality, we must no longer rely on the processes and tools that made us successful in years past; businesses must consider the leading indicators of our culture and find smart, cost-effective ways to leverage the power of mobility.
Donâ€™t put yourself in a position to find your business out of touch and out of time. Contact TechOrchard at 913.685.1475 for help crafting a tailored plan to implement Enterprise Mobility Management (EMM) in your organization today.
1 VMware Model for Enterprise Mobility: The Keys to Greater Productivity Are Already in Your Employeesâ€™ Hands. 2013, VMware, Inc. Available online at: http://www.vmware.com/files/pdf/solutions/VMW-EB-MOBILITY-CLOUD_USLET.pdf.
2 State of the Net Survey. 2014, Consumer Reports National Research Center. Available online at http://pressroom.consumerreports.org/pressroom/2014/04/my-entry-1.html.
3 Forecast: PCs, Ultramobiles, and Mobile Phones, Worldwide, 2011-2018, 2Q14 Update. June 2014, Gartner, Inc. Press release available online at http://www.gartner.com/newsroom/id/2791017.
In recent weeks, the FDA and the Center for Internet Security have released guidance documents on medical device security. While there are no hard and fast recommendations, given the diverse types of devices and environments in which they’re used, there are benchmarks for manufacturers and purchasers.
By Brian Estwood Â | Â October 15, 2014 Â | Â CIO
Healthcare’s increasing reliance on medical devices, coupled with an ever-growing list ofÂ healthcare IT security threats, has pushed device safety to the forefront of the cybersecurity conversation. (TheÂ pacemaker hack onÂ Homeland, the Emmy-winning Showtime drama, drew attention to the issue, too.)
To that end, the Center for Internet Security (CIS), working with the Medical Device Innovation, Safety and Security Consortium (MDISS), today releases a set ofÂ security recommendationsÂ for device manufacturers to follow during development and for healthcare providers to use during product evaluation.
The guidance aligns established CIS benchmarks and best practices to the security capabilities recommended by theÂ IEC 80001-1Â standard, which covers risk management for IT networks that include medical devices.
The CIS resources, along with the Food and Drug Administration’s recently releasedÂ guidance on cybersecurity in medical devices, offer guidelines as opposed to strict rules. That’s because there’s such disparity in the intended use of medical devices, as well as the environments in which they’re used, says Rick Comeau, strategic advisor at CIS. “It’s hard to say, ‘These are the specific recommendations for a medical device.'”
For example, lockout screen controls impact patient care different in an emergency room than they do in an outpatient setting. (That’s why some have suggested that the overallÂ benefits of medical devices trump suspect security.)
For his part, Comeau sees the CIS guidelines serving as a “supplementary aide” to the device purchasing process. Organizations can use the benchmarks, coupled with theÂ Manufacturer Disclosure Statement for Medical Device Security (MDS2) form, to see how a device addresses various cybersecurity recommendations. If the form isn’t filled out, or if certain benchmarks haven’t been met, then a purchaser can know that it’s OK to walk away, Comeau says.
Medical Device Security Guidance Remains Work in Progress
CIS focused its initial medical device security guidance documents on Windows XP and Windows 7, as the bulk of medical devices run those operating systems, either in full or in an embedded, componentized version. Plus, the organization already has consensus-based security benchmarks for those popular Windows versions.
Future guidance will address iOS, Android and other mobile operating systems, all of which appear poised to play an expanding role in medical diagnostics and transferring data to patients. “We’re very cognizant of where the market’s going,” Comeau says, adding that CIS will map its security benchmarks to standards here as well.
As healthcare continues to embrace mobile health as a means of improving patient engagement in the care process, Comeau says benchmarks and best practices will continue to focus on the so-calledÂ CIA triadÂ of data confidentiality, integrity and availability. Those topics also appear on the agenda of a two-dayÂ public workshopÂ on collaborative medical device and healthcare cybersecurity organized by the FDA, the Department of Health and Human Services and the Department of Homeland Security.
Questions? Or looking for additional ways to improve your mobile device experience? Contact TechOrchard at 913.685.1475 for help.
By Konrad Krawczyk Â | Â digitaltrends.com
Privacy is hard to come by on the Internet, and some folks out there are just not satisfied with that reality.
One firm,Â dubbed Anonbox, has created a router of the same name that, it claims, is the device you should use if you want the â€śbest and most secure way to access the Internet anonymously,â€ť according to theÂ projectâ€™s official Kickstarter page.
The Anonabox allegedly encrypts all Internet activity without requiring you to download software, createÂ any sort of log-in information, or do any configuration. Thereâ€™s no need to register for any sort of services either. The setup process consists of just plug-and-play.
With this open source router, Anonabox purports that youâ€™ll be able to use popular services like Skype, Safari, and others without having to worry about whether your online activities are anonymous or not.
Anonabox notes that as more and more people start using the Tor network, there are bound to be some folks who are unaware ofÂ what steps they should take to make sure that they donâ€™t accidentally leak out any information about themselves while surfing the Web. This problem, the company claims, is one thatâ€™s solved by the Anonabox, due to its simplicity, and ease of use.
The routerâ€™s creators were inspired to create the Anonabox by reports of Arab Spring protesters being cut off from Twitter by the government there.
â€śHow about if we were to actually build that anti-censorship box we were just talking about and mail it out to people,â€ť Anonaboxâ€™s creators wondered when they were thinking of how to create such a device. â€śLittle did we know, it would take over four years, and a lot more tacos and beer, to create a device with the security, speed, functionality and easy-of-use that is the anonabox.â€ť
As an added bonus, the Anonabox is pretty small, allowing you to conceal it just about anywhere.
So far, the Anonabox Kickstarter campaign has been fabulously successful. While the developers set an initial funding target of $7,500, the campaign has received over $85,000 in contributions as of this writing. Plus,Â thatâ€™s with 29 days to go.
If you order an Anonabox now by pledging $45 or more, you should get it sometime in January 2015. However, keep in mind thatÂ the page notes this as an â€śestimated deliveryâ€ť time-frame.
You can learnÂ more about the Anonabox here.
Apple’s iPad event on Oct. 16 could go a long way toward positioning the tablet more as an enterprise device. If Apple wants more unit shipments and market share, the enterprise is going to be its best option.
Larry Dignan Â | Â zdnet.com
Apple’s iPad event on Thursday will refresh the product line, bolster the company’s holiday shipments and move the tablet more into the enterprise arena. That latter point may be the most critical for Apple in the long run.
Aside from the usual product cycle implications for the Apple, I’m betting that over time the iPad will be seen as a more of an enterprise device than a personal one. Apple’s iPhone has a lot of business traction, but the iPad is close behind and has a better shot than the Mac ever will in the enterprise.The tablet market is going to be dominated by cheap almost throwaway devices, but Apple can preserve margins with a corporate spin.
Here’s why Apple’s iPad is looking more like a corporate device than a personal one.
Tablets can be personal but only to a degree. The bottom line when it comes to device intimacy is that the smartphone is the gadget always with you. A tablet may make the cut, but often isn’t packed with the rest of your computing gear. When the iPad launched, then Apple CEO Steve Jobs said the device created a new category “that will connect users with their apps and content in a much more intimate, intuitive and fun way than ever before.” I’d argue that the iPad and other tablets can only go so far on the intimacy scale. The smartphone remains the go-to device.
iPad replacing laptops. The larger iPads â€”Â including a rumored 12.9-inch version on tap in 2015 â€”Â are often seen as laptop replacements for a certain type of worker. With the iPhone 6 Plus eating away at iPad mini sales in the future, Apple’s tablet portfolio will skew to the larger screens. That reality makes the iPad more suited in areas where laptops would have roamed. Apple’s slate of business apps also work better on larger screens. Toss in Apple’s partnership with IBM and you have the makings of a corporate more than personal device.
iPads in the field as kiosks and sales tools. The most innovative uses of the iPad are seen in the field with businesses both large and small. The iPad is becoming a cash register and card reader of choice for many businesses as applications such as Square become staples. Meanwhile, the iPad serves as kiosk and sales too to close deals. How many times have you seen a personal app on the iPad where you stop and do a double take? In a business setting, the iPad can still be a head turner.
Longer refresh cycles. Tablets have a long shelf life and that’s why sales growth is slowing rapidly. Tablets replacement cycles may ultimately resemble PCs with three-year minimums and likely longer turns in the field. There’s no reason to replace an iPad â€”Â or any other tablet â€”Â on the same cadence as Apple. Managing those corporate enterprise replacement cycles will be critical to long-term growth.
Security and enterprise features. The latest iPad will have the enterprise features included in iOS 8, but are also likely to have Touch ID, which can enhance identity management on a broader scale. Apple’s Touch ID API opens the door for third-party developers to use biometrics as an authentication tool.
Alyssa Bereznak Â | Â October 13, 2014 Â | Â yahoo.com
Update:Â Dropbox has posted the following:
Dropbox wasnâ€™t hacked.
Recent news articles claiming that Dropbox was hacked arenâ€™t true. Your stuff is safe. The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the internet, including Dropbox. We have measures in place to detect suspicious login activity and we automatically reset passwords when it happens.
Attacks like these are one of the reasons why we strongly encourage users not to reuse passwords across services. For an added layer of security, we always recommendÂ enabling 2 step verificationÂ on your account.
A subsequent list of usernames and passwords has been posted online. Weâ€™ve checked and these are not associated with Dropbox accounts.
Our original story follows …
Hundreds of Dropbox passwords may have been leaked online.
The Next WebÂ discovered a Reddit comment thread Monday evening that linked to a site where hundreds of usernames and passwords for the storage site were revealed in plain text. (The Reddit thread is easy to find, but since it links to lists of the hacked passwords, we are not linking to it here.)
According to the thread, those responsible for the hack are asking forÂ Bitcoin donationsÂ (for some reason), but havenâ€™t had much luck. As of this writing, they have raised 0.0001 bitcoin, or about 4 cents.
Though the cloud storage company has not yet posted anything about the hack, it did disable the listed passwords and is forcing users of those accounts to create new passwords when they next use Dropbox, according to The Next Web.
The perpetrators of the hack claim they have 7 million compromised passwords. If you are a Dropbox user, now is as good a time as ever to change your password and enableÂ two-step verificationÂ on the site.
Among the many passwords exposed in the hack, one of the worst was 123abc. For advice on how to create and use far stronger passwords, check out our comprehensiveÂ guide to fixing your passwords. Also helpful: aÂ guide to protecting your home networkfrom hackers. Feel free to send the link to Dropbox, too.
Weâ€™ll keep you updated on this story once we hear back from Dropbox.