Navigation Links
Global Survey Shows Personal Mobile Computing Devices Growing Into a Major Cyber Security Concern

New York, NY (PRWEB) October 26, 2013

As technology continues to march forward, popular mobile personal computing devices like smartphones and tablets continue to get more powerful and convenient all the time. And as the survey of 3,200 currently employed 21-32 year olds conducted by the independent market research company Vision Critical on behalf of Fortinet earlier this month revealed, “the need for organizations to finally to shift a lot more emphasis to BYOD (Bring Your Own Device) policies, procedures and security awareness has never been greater, or more apparent,” says Joe Caruso, founder and CEO/CTO of Global Digital Forensics.

The line between personal and professional computing is getting blurrier by the day, and that can spell big trouble for IT security.

“It wasn’t that long ago that IT security personnel didn’t have to give a second thought to personal mobile devices as a threat to an organization’s cyber security posture, but those days are over,” says Caruso, “and with even more personal computing devices breaking into the market like Google Glass and smart watches, the problem of controlling and securing digital assets and sensitive data is not going to get any easier any time soon. The survey focused on the young Generation Y crowd, but don’t be fooled, users from every age group are in the mix too. And to further complicate matters, the increasing use of popular, free and easy-to-use cloud-based online data storage sites like Dropbox, and the potential security headaches associated with comingling personal and professional files and data outside of the organization’s control are also important factors that must be seriously considered and monitored.”

Battling a 51% Majority

“But the one number that should cause some sleepless nights for IT security personnel and business owners alike was that whopping 51% of those surveyed who admitted they would ignore any policy which would ban their use of personal devices at work, or for doing work. So it should be crystal clear that stomping out potential security holes related to mobile personal devices is not a problem that will likely be solved by trying to simply remove them from the equation. The same goes for personal online data storage sites. With just about 9 out of 10 respondents stating they have an account like Dropbox, and 7 out of 10 of those saying they use it regularly for work purposes, the potential for bad things to happen on the data security front certainly wouldn’t be considered a longshot by any oddsmaker. Another big problem is that a majority of those surveyed also admitted to being hacked or infected with a virus on their personal devices in the past, and that means there is also a very good chance they will be a great delivery method for hackers to infiltrate the company network as well.”

Assessing, Testing, Building Awareness and Emergency Incident Response

“The best way to deal with the threats posed by the growing BYOD movement, and the other peripheral issues like cloud-based data storage, is by reshaping the organization’s cyber security posture to keep up with the newest trends in technology and user behavior, because relying on yesterday’s assessments, methods, policies and procedures will leave you exposed and vulnerable today. At GDF, we’ve been helping clients protect their most valuable digital assets and data for many years by providing cutting-edge cyber security solutions. Our network vulnerability assessment protocols are constantly being updated to include the newest trends and threats. Our comprehensive penetration testing framework is always being refined to simulate what hackers are doing in the real-world, right now today, from the newest techniques and malware, to full simulations of sophisticated spear phishing campaigns, the number one delivery method for advanced attacks. We work hand in hand with our clients through every step of the process, from identification all the way through remediation, including helping them significantly improve user awareness on today’s cyber threats on an organizational level, because without addressing the human element, everything else is just an exercise, not a solution. And if the unthinkable has already happened, like a data breach or cyber intrusion, we have emergency incident response teams strategically positioned across the country and worldwide who are on call 24/7 to respond to any cyber emergency. In most cases, we can even start the remediation process remotely, which means immediately.”

And Don’t Forget the Power Tools

“We’ve also recently introduced two new software solutions to help IT security personnel combat both outsider and insider threats like never before. We just released the new DBRT, the Data Breach Response Toolkit, which is designed identify and remove the most sophisticated malware in existence today to help effectively stop and remediate even the most advanced cyber attacks, without relying on a known signature. DBRT’s agents can be controlled from a single command and control console so you can push the appropriate agents (Recon, Tactical, and/or Shield agents) to the right systems enterprise wide. You can even inoculate systems against reinfection from any threats identified, again, enterprise wide, and with a single click, right from the console. Visit GDF’s DBRT page to download a trial version and see for yourself.”

“We’ve also just released the new C-All User Activity Monitor|Recorder, which is like a video surveillance system for your network. C-All lets you not only monitor what’s happening in real time, but also lets you roll back time to see what users were up to in the past. You can set triggers to alert you when certain activities are performed, certain files were accessed, certain sites were visited or even when certain keywords are typed, then play it back in video form, so no more guesswork. A trial version is available on GDF's C-All page. “

*Global Digital Forensics is a recognized industry leader in the fields of computer forensics services, electronic discovery (eDiscovery), cyber security and emergency incident response, with years of experience assisting clients in the government, banking, healthcare, education and corporate arenas. For a free consultation with a Global Digital Forensics specialist, call 1-800-868-8189 about tailoring a plan which will meet your unique needs. Emergency responders are also standing by 24/7 to handle intrusion and data breach emergencies whenever and wherever they arise. Time is critical if a cyber-incident has occurred, so don’t hesitate to get help. For more information, visit

Read the full story at

Source: PRWeb
Copyright©2012 Vocus, Inc.
All rights reserved

Related medicine news :

1. Antibiotic Resistance 2013: A Global Market Study
2. Congenital Heart Disease Global Clinical Trials Review, H2, 2013
3. Pregnancy Global Clinical Trials Review, H2, 2013
4. General Anxiety Disorder Global Clinical Trials Review, H2, 2013
5. Vi Tour Experience - Body By Vi Dream Team Behind the Scenes at Vi Global Headquarters
6. ExactTarget Presents Global Services Award to ListEngage
7. Global Companion Diagnostics Market - Industry Analysis, Size, Share, Growth, Trends and Forecast, 2013 - 2019
8. Global Nitrogenous Fertilizer Market to 2017 is the New Research Report Available with
9. Statement from Special Envoy Ray Chambers on the Findings of the WHO Global Tuberculosis Report 2013
10. Innovation in Health and Beauty Packaging, 2013 - A review of recent trends, drivers and issues in global Health and Beauty packaging
11. Unique Dry Eye Relief Technology Builds Momentum with a New Global Patent
Post Your Comments:
(Date:6/24/2017)... , ... June 24, 2017 , ... ... offering genetic testing for medications in select Florida and Texas doctors' offices and ... , This new application of genetic testing recognizes the role genes play in ...
(Date:6/24/2017)... Waco, TX (PRWEB) , ... June 24, 2017 , ... ... opportunity to spend time outdoors. Home and business owners should be aware that the ... to the lake. In fact, mechanical locks and keys can be negatively affected from ...
(Date:6/23/2017)... ... June 23, 2017 , ... "The ... will ultimately do significant harm to people with all chronic conditions, including mental ... it leaves in place the Affordable Care Act (ACA) requirement that insurers cover ...
(Date:6/23/2017)... ... ... Studies show evidence that carotenoids and antioxidants derived either from the diet ... , But how often do ophthalmologists and optometrists in Sweden recommend the use of ... with early symptoms of AMD? A study published recently in Dove Medical ...
(Date:6/23/2017)... ... June 23, 2017 , ... Military Connection friend ... entry to the JFK Virgin Atlantic lounge. , Bensko is no stranger to ... years ago, Bensko dedicated her life to supporting our wounded veterans. A world-class photographer, ...
Breaking Medicine News(10 mins):
(Date:6/7/2017)... Md. , June 7, 2017  Novavax, Inc., (Nasdaq: ... second of two Phase 2 trials of its RSV F ... of child bearing age have been published in the journal ... publication have been shared in prior scientific conferences). The Company ... in April 2014. Novavax is developing the RSV F Vaccine ...
(Date:6/5/2017)... Neb. , June 5, 2017 ... in the United States . ... helps a fallen person up to an almost-standing ... easily assembled and operated by one assistant and does ... It is simple enough that a child can operate ...
(Date:6/1/2017)... 1, 2017 Nutriceutical Holdings (NH), parent company ... (VRS), and KD Pharma Group have decided to join ... KD Pharma Group. KD Pharma Group will become the ... acquire the entire company. "We believe we ... committed to growing the NH companies by providing us ...
Breaking Medicine Technology: