How Organizations can Secure Their Database From External Attacks
Term assignment
1. Term Assignment
Managing access to records in a BYOD environment
http://www.infoworld.com/d/consumerization-of-it/byod-beyond-the-device-information-
management-essential-212752
Three aspects to the deployment of the policies need to be worked out:
1. What capabilities must devices support to be allowed access to corporate data,
applications, and networks
2. What information should be visible and accessible to each group of employees (based on
role and perhaps individual trust level) -- it's easier to protect data at the source than to
worry about what happens to it after it has been made available, yet most companies
focus on managing data once it is out the door
3. What environments are considered too risky to provide access even for devices and
people who meet the first two aspects of trust for a given type of access
This is directed to IT peeps :http://www.trendmicro.com/us/enterprise/challenges/it-
consumerization/index.html
Enterprises can take advantage of BYOD and consumerization with a strategy to reduce security
risks, financial exposure, and management chaos. This strategy helps IT balance the risk against
the benefits of consumerization with a solutions infrastructure and BYOD program to help IT:
Regain visibility and control by managing company data and limiting liabilities on
personal devices
Share corporate data confidently with secure access, backup, and file sharing
Protect data wherever it goes with context-aware security
From linkedin:
http://www.linkedin.com/groupItem?view=&gid=40713&type=member&item=192823411&trk=group_s
earch_item_list-0-b-ttl&goback=.gna_40713
A simple, proactive security solution should allow users to operate at the speed of business. If it’s too
complex or takes in-depth technical knowledge to utilize, only a handful of people within a company will
use it – which defeats the overall purpose of trying to protect your digital assets and your organization.
2. This effect is reflected in a number of failed Digital Rights Management product implementations.
If you are serious about the matter of digital asset security I recommend the following.
1. Educate your respective staff members on vulnerabilities which present liabilities to your
organizations.
2. Review your policies regarding the creation and processing of digital assets, especially if your digital
assets are being sent outside your organization.
3. Seek a solution which provides strong encryption prior to sending your digital assets offsite.
4. Automatically enforce polices to truly have consistency in how your digital assets are protected and
handled.
I’ll leave you with the following to consider. Have we, as a society, sacrificed security for simplicity? And
if we have, are we ready and able to handle the consequences?