Navigation Links
Global Survey Shows Personal Mobile Computing Devices Growing Into a Major Cyber Security Concern

New York, NY (PRWEB) October 26, 2013

As technology continues to march forward, popular mobile personal computing devices like smartphones and tablets continue to get more powerful and convenient all the time. And as the survey of 3,200 currently employed 21-32 year olds conducted by the independent market research company Vision Critical on behalf of Fortinet earlier this month revealed, “the need for organizations to finally to shift a lot more emphasis to BYOD (Bring Your Own Device) policies, procedures and security awareness has never been greater, or more apparent,” says Joe Caruso, founder and CEO/CTO of Global Digital Forensics.

The line between personal and professional computing is getting blurrier by the day, and that can spell big trouble for IT security.

“It wasn’t that long ago that IT security personnel didn’t have to give a second thought to personal mobile devices as a threat to an organization’s cyber security posture, but those days are over,” says Caruso, “and with even more personal computing devices breaking into the market like Google Glass and smart watches, the problem of controlling and securing digital assets and sensitive data is not going to get any easier any time soon. The survey focused on the young Generation Y crowd, but don’t be fooled, users from every age group are in the mix too. And to further complicate matters, the increasing use of popular, free and easy-to-use cloud-based online data storage sites like Dropbox, and the potential security headaches associated with comingling personal and professional files and data outside of the organization’s control are also important factors that must be seriously considered and monitored.”

Battling a 51% Majority

“But the one number that should cause some sleepless nights for IT security personnel and business owners alike was that whopping 51% of those surveyed who admitted they would ignore any policy which would ban their use of personal devices at work, or for doing work. So it should be crystal clear that stomping out potential security holes related to mobile personal devices is not a problem that will likely be solved by trying to simply remove them from the equation. The same goes for personal online data storage sites. With just about 9 out of 10 respondents stating they have an account like Dropbox, and 7 out of 10 of those saying they use it regularly for work purposes, the potential for bad things to happen on the data security front certainly wouldn’t be considered a longshot by any oddsmaker. Another big problem is that a majority of those surveyed also admitted to being hacked or infected with a virus on their personal devices in the past, and that means there is also a very good chance they will be a great delivery method for hackers to infiltrate the company network as well.”

Assessing, Testing, Building Awareness and Emergency Incident Response

“The best way to deal with the threats posed by the growing BYOD movement, and the other peripheral issues like cloud-based data storage, is by reshaping the organization’s cyber security posture to keep up with the newest trends in technology and user behavior, because relying on yesterday’s assessments, methods, policies and procedures will leave you exposed and vulnerable today. At GDF, we’ve been helping clients protect their most valuable digital assets and data for many years by providing cutting-edge cyber security solutions. Our network vulnerability assessment protocols are constantly being updated to include the newest trends and threats. Our comprehensive penetration testing framework is always being refined to simulate what hackers are doing in the real-world, right now today, from the newest techniques and malware, to full simulations of sophisticated spear phishing campaigns, the number one delivery method for advanced attacks. We work hand in hand with our clients through every step of the process, from identification all the way through remediation, including helping them significantly improve user awareness on today’s cyber threats on an organizational level, because without addressing the human element, everything else is just an exercise, not a solution. And if the unthinkable has already happened, like a data breach or cyber intrusion, we have emergency incident response teams strategically positioned across the country and worldwide who are on call 24/7 to respond to any cyber emergency. In most cases, we can even start the remediation process remotely, which means immediately.”

And Don’t Forget the Power Tools

“We’ve also recently introduced two new software solutions to help IT security personnel combat both outsider and insider threats like never before. We just released the new DBRT, the Data Breach Response Toolkit, which is designed identify and remove the most sophisticated malware in existence today to help effectively stop and remediate even the most advanced cyber attacks, without relying on a known signature. DBRT’s agents can be controlled from a single command and control console so you can push the appropriate agents (Recon, Tactical, and/or Shield agents) to the right systems enterprise wide. You can even inoculate systems against reinfection from any threats identified, again, enterprise wide, and with a single click, right from the console. Visit GDF’s DBRT page to download a trial version and see for yourself.”

“We’ve also just released the new C-All User Activity Monitor|Recorder, which is like a video surveillance system for your network. C-All lets you not only monitor what’s happening in real time, but also lets you roll back time to see what users were up to in the past. You can set triggers to alert you when certain activities are performed, certain files were accessed, certain sites were visited or even when certain keywords are typed, then play it back in video form, so no more guesswork. A trial version is available on GDF's C-All page. “

*Global Digital Forensics is a recognized industry leader in the fields of computer forensics services, electronic discovery (eDiscovery), cyber security and emergency incident response, with years of experience assisting clients in the government, banking, healthcare, education and corporate arenas. For a free consultation with a Global Digital Forensics specialist, call 1-800-868-8189 about tailoring a plan which will meet your unique needs. Emergency responders are also standing by 24/7 to handle intrusion and data breach emergencies whenever and wherever they arise. Time is critical if a cyber-incident has occurred, so don’t hesitate to get help. For more information, visit

Read the full story at

Source: PRWeb
Copyright©2012 Vocus, Inc.
All rights reserved

Related medicine news :

1. Antibiotic Resistance 2013: A Global Market Study
2. Congenital Heart Disease Global Clinical Trials Review, H2, 2013
3. Pregnancy Global Clinical Trials Review, H2, 2013
4. General Anxiety Disorder Global Clinical Trials Review, H2, 2013
5. Vi Tour Experience - Body By Vi Dream Team Behind the Scenes at Vi Global Headquarters
6. ExactTarget Presents Global Services Award to ListEngage
7. Global Companion Diagnostics Market - Industry Analysis, Size, Share, Growth, Trends and Forecast, 2013 - 2019
8. Global Nitrogenous Fertilizer Market to 2017 is the New Research Report Available with
9. Statement from Special Envoy Ray Chambers on the Findings of the WHO Global Tuberculosis Report 2013
10. Innovation in Health and Beauty Packaging, 2013 - A review of recent trends, drivers and issues in global Health and Beauty packaging
11. Unique Dry Eye Relief Technology Builds Momentum with a New Global Patent
Post Your Comments:
(Date:2/12/2016)... ... February 12, 2016 , ... Coco Libre, the maker of ... Carpet Events LA GRAMMY’s Style Lounge Event. Coco Libre will offer musicians and celebrities ... before the big event. The invitation-only gifting suite, held this year at the W ...
(Date:2/12/2016)... ... February 12, 2016 , ... Every winter, someone is killed, injured ... West Penn Burn Center, part of the Allegheny Health Network, has partnered ... you the “Space Heaters Need Space” campaign. , “Space Heaters Need Space” ...
(Date:2/12/2016)... ... February 12, 2016 , ... Vail knee specialist Robert LaPrade, MD, PhD ... 2016 . The list consists of physicians establishing, leading and partnering with ambulatory surgery ... , An Ambulatory Surgery Center, also known as an ASC, is a modern health ...
(Date:2/12/2016)... ... ... Miami Dental Specialists is excited to bring patients the choice of ceramic, ... Dental Specialists will offer the non-metal implants as a safe, holistic and hygienic approach ... the dental implant manufacturer, Straumann, to bring this cutting-edge technology to Miami. ...
(Date:2/12/2016)... ... February 12, 2016 , ... Nearly every ... promote eye health. These articles generally list between five and 15 foods that ... Kleyne endorses every one of these lists and believes that nutritious eye healthy ...
Breaking Medicine News(10 mins):
(Date:2/12/2016)...  Eli Lilly and Company (NYSE: LLY ) today ... disodium) vitamin regimen patent would not presently be infringed by ... , Italy and ... with dextrose solution.  --> ... Appeal held that Lilly,s patent would be indirectly infringed by ...
(Date:2/12/2016)... LOUISVILLE, Ky. , Feb. 12, 2016 ... it has completed a $47.1 million Series ... investors Cormorant Asset Management, Hillhouse Capital Group ... investors Morningside Venture Investments, AJU IB Investment, ... will be used to further advance clinical ...
(Date:2/11/2016)... 2016 The primary goal of this research ... on the usage of liquid biopsy. Key information the ... - Timeframe of liquid biopsy adoption amidst future users ... organization type - Sample inflow to conduct liquid biopsy ... serum, and so on. - Correlation analysis of sample ...
Breaking Medicine Technology: