Congrats Garin Livingstone, Bryley Systems Senior Tech, for successfully completing and passing your Windows 7 configuring class and test!!!
A recent Data Breach Investigation Report (DBIR) from Verizon notes that 98% of data breaches stemmed from external sources using hacking techniques (81%) and malware (69%). About 79% of the data breaches were directed at “targets of opportunity”, typically smaller organizations that are vulnerable through an “exploitable weakness”; most attacks were performed using relatively unsophisticated […]
As mentioned in our August 2012 Bryley Tips and Information, Google has moved Google Message Security (GMS)/Postini into Google Apps for Business and will migrate all GMS/Postini customers to Google Apps for Business by the end of 2013. Google will migrate GMS/Postini users gradually, focusing initially on its large, direct-billed customers and eventually tackling those […]
We have explored the importance of setting policies and training users on mobile device security and management; now, we wrap-up with how to enforce these policies, recommended tools, and first steps to mobile device security. Enforcement Enforcement is usually assisted through a Mobile Device Management (MDM) tool; typically a software-based application that requires […]
Microsoft has revealed that the Windows Server 2012 options will be drastically streamlined from the myriad choices of its predecessor. In the paring down, though, Microsoft is killing off Windows Small Business Server, and Windows Home Server–the two most popular versions for small and medium businesses (SMBs). On the one hand, the news is quite welcome. Variety […]
Training is an important, early step in any process; informing end-users of the need to secure their mobile devices is critical. Recommended training topics: ● Why we need to authenticate and encrypt ● How to reduce the risk of loss or theft ● How to safely deploy new applications ● How to securely backup your data Authenticate and encrypt […]
The need to secure newer mobile devices (smartphones, tablets, etc.) has grown since they now meet the basic criteria for malicious, cyberspace-based attack: Developer kits are readily available Mobile devices are in widespread use throughout the world Motivation is increasing since usable/saleable data live on these devices In addition, BYOD (Bring Your Own Device) […]