Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 - Page 22

Infradapt Blog

This is some blog description about this site

Here are Your Options for Managing Mobile Devices in the Workplace

Here are Your Options for Managing Mobile Devices in the Workplace
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

Did you know that, according to Gartner, a whole 80 percent of all employees bring their personal mobile devices to the office? It’s a rather troubling development for business owners who want to secure their data and keep their employees productive. However, this Bring Your Own Device (BYOD) trend has proved extremely beneficial for prepared organizations. This must prompt the question of how your business manages mobile devices in the workplace.


The usual response to mobile devices appearing in offices is either the employer supplying company devices, or preventing their use altogether. Unfortunately, neither of these are all positive, so it’s best to approach the situation with an informed and open mind. What follows are the circumstances that come with each approach.

Company-Provided Mobile Devices
Depending on the kind of work your organization does, providing company devices might be beneficial for employees. However, you’ll need to consider all of the finer details, including which platform the devices run on (iOS, Android, Windows), contract terms, and how your organization plans on controlling and protecting data located on the devices. Creating a policy that clearly outlines how work and personal information is separated on the device, the privileges that the employee has with the device, a plan if the device is ever misplaced, and what happens when the employee quits, is the key to guaranteeing data security.

Unfortunately, this is often seen as a quick fix. You are spending money and forcing your employees to comply with the rules, but this doesn’t fix the problem of controlling data on its own. Statistics also show that employees aren’t particularly unhappy about company-owned devices, but that the solution can feel like a slap in the face to employees who work well using their own personal devices. On the other hand, some staff might feel excited about a brand new smartphone on the company’s budget, so it’s up to you to determine what the best approach to this situation is.

Banning Personal Devices Altogether
Some employers will just fully ban access to personal devices, which means that any employee using them for any reason will be written up or face similar consequences. While this can protect your data, this will likely create a rift between your employees and management. You might only be trying to protect your data, but they’ll only see this as management making their jobs more difficult. While this doesn’t necessarily happen all the time, it’s still often enough to cause concern. It’s also problematic for your organization, as mobility is likely something that your competitors have considered implementing themselves.

Thankfully, There Are Options
If you can meet your employees in the middle ground of this sensitive topic, they’ll be thankful for it. By this, we mean taking the time to discuss data security with your employees while allowing them to use their own personal devices, so long as they abide by your protocol. Employers have the opportunity to push policies such as including some type of authentication on their devices (passwords, pins, patterns, etc), alongside secondary measures such as two-factor authentication on accounts located on the device. Providing the employer with the rights to revoke access to email and the ability to wipe data in the event of a stolen device must also be a point of discussion.

Laptops brought from home should be outfitted with company antivirus protection and remote monitoring, along with the ability to set up a VPN or hosted desktop solution so that there's no need to worry about what sorry state the device is in. This can also make it easier to solve troubles with software licensing and accessing company data while on a public Wi-Fi connection.

The best way to approach personal mobile devices in the office is by implementing a BYOD strategy. This should be capable of responding to any and all security discrepancies that may arise from mobile devices being used for work purposes. If you’re having trouble putting together such a policy, it’s in your best interest to reach out to professional technicians for consultation. Infradapt can help your organization put together a solid BYOD policy that keeps your data secure. To learn more, reach out to us at 800.394.2301.

0 Comment

Alert: Homeland Security Finds U.S. Power Grid Vulnerable to CrashOverride Malware

Alert: Homeland Security Finds U.S. Power Grid Vulnerable to CrashOverride Malware

On June 12th, the U.S. Department of Homeland Security issued a warning to power grid operators and electric utilities concerning a newly surfaced malware called CrashOverride (aka Industroyer). Only, it’s not entirely new. The world has seen this before and the fallout from it is concerning.


The warning comes from the Computer Emergency Readiness Team’s (CERT’s) National Cybersecurity and Communications Integration Center (NCCIC). In it, public reports from ESET and Dragos reported “a new highly capable Industrial Controls Systems (ICS) attack platform that was reportedly used in 2016 against critical infrastructure in Ukraine.”

You may recall a similar incident hitting the news not too long ago when workers at a Ukrainian power distribution center watched helplessly as hackers took control of their computers, and used them to shut down heat and power for over 230,000 citizens. Though the power wasn’t out for very long (somewhere between one-to-six hours, depending on location), the control centers are still suffering from the attacks several months later. In addition to turning off the power, hackers also overwrote crucial firmware, which left 16 substations unresponsive to remote commands. This is the first confirmed instance of hackers successfully taking down a power grid, and it’s thought that these hackers were very meticulous and sophisticated in the execution of this attack.

Last year, the FBI began a campaign to raise awareness of the potential issue by briefing electrical power companies of the risk. Although, the possibility of such an attack hitting the United States was deemed improbable. Thankfully, there is currently no evidence to suggest that this malware has affected critical infrastructure in the U.S., but the recent CERT warning suggests that such an attack has grown more probable. This risk is due to CrashOverride having the potential to be modified to target vulnerabilities in U.S. critical information network and systems via the malware’s tactics, techniques, and procedures (TTPs). 

To give you an idea of how dangerous the malware is, the Dragos report links the malware to the group responsible for Sandworm, a wicked zero-day vulnerability that executed code within affected systems by opening a backdoor for later access. This threat utilizes phishing attacks and has the ability to spread between networks with the goal of disrupting systems and stealing sensitive information.

In the CERT warning, the recommended way to handle CrashOverride is for utility companies to take a proactive stance when it comes to cybersecurity. This includes implementing techniques for providing and identifying malware. In truth, this is the same approach to cybersecurity that we recommend for all businesses, regardless of industry, size or location. As the sophistication of cybercrime continues to develop, properly monitored and maintained networks are a company's first line of defense. Contact us today to learn more about network security and best practices.

0 Comment

How the Convenience of The Internet of Things Can Come Back to Bite Us

How the Convenience of The Internet of Things Can Come Back to Bite Us

While the Internet of Things has made many common tasks much easier through automation, it has also increased the potency of particular cybersecurity threats. For an excellent example, one only has to turn to the increasing prevalence of botnets that are powered by IoT technology.

0 Comment

Tip of the Week: Options for Quieting a Noisy Computer

Tip of the Week: Options for Quieting a Noisy Computer

How much noise does your work desktop make? Chances are that the majority of it comes from the fans. These fans are designed to cool down the systems while also maintaining an acceptable noise level. However, the longer your technology lasts, you might realize that these fans seem a bit louder than usual due to your machine needing more work from them to keep the innards cool.

0 Comment

You Will Soon Be Able to Search the Web With Your Smartphone Camera, Thanks to Google Lens

You Will Soon Be Able to Search the Web With Your Smartphone Camera, Thanks to Google Lens

While many instances of augmented reality may seem gimmicky, Google is taking strides toward making AR a purposeful utility in our mobile devices. This was made apparent when Google’s CEO, Sundar Pichai, announced Google Lens.

0 Comment

Advice for Passing Your Next IT Audit With Flying Colors

Advice for Passing Your Next IT Audit With Flying Colors

Most people think of audits and immediately cringe, but the fact of the matter is that businesses wanting to maximize output can really benefit from an audit. Audits can be great ways to ensure that a business’ priorities are being given their due attention, and that best practices are being utilized. An audit of your IT infrastructure and network can go a long way toward helping you determine if there are changes you need to make in order to maximize the profitability of your organization.

0 Comment

Tip of the Week: Got a Solid State Drive? Here’s How to Take Care of It

Tip of the Week: Got a Solid State Drive? Here’s How to Take Care of It

You may have purchased a solid state drive because of its many benefits over the hard disk drive. Although, if you want to get the most bang for your buck with a SSD, you’ll want to follow these best practices.


Install the Latest Operating System
Operating systems are updated periodically, but they are implemented with the idea in mind that more devices will be using a solid state drive compared to the normal hard disk drive. By upgrading to the latest operating system, you’re guaranteeing that your OS will be able to support your SSD.

Avoid Manipulating Data or Activating Wasteful Settings
An SSD can only rewrite data so many times before it’s unable to do so. While this limit isn’t low, the standard SSD can handle 40 GB of data writing every day for up to 10 years. Therefore, it’s a bad move to use your SSD to copy files or download data, as this puts unnecessary strain on the device. This means that you want to avoid the following features that your technology might be equipped with:

 

  • Benchmarking: While SSDs are fast to write data, it’s important to avoid running speed tests to see exactly how fast yours is. This will only shorten the lifespan of your drive, as it will use up valuable cycles that would be better used elsewhere.
  • Hibernation: Your computer can save system memory to the hard drive before it’s powered off. While this can help, you get back in business and resume operations quickly in the near future, it takes up more cycles on your SSD than you might prefer. Contrary to popular belief, putting your device to sleep and hibernation are two very different things, as letting your device sleep is much safer and more efficient for SSDs than for HDDs.
  • Defragging: When you defrag your device, it actively looks at the data to organize it on the mechanical level. While defragging improves the performance of HDDs, the benefits provided to SSDs aren’t noticeable, but the wear and tear might be if you proceed to perform them unnecessarily.

Be Mindful of Your Saves
The nature of SSDs make them more suitable for data storage of particular varieties. For example, it’s not recommended that SSDs be used to save large files, or the temporary files created by background processes. In these cases, it’s better to rely on a hard disk drive for saving this kind of data.

On the plus side, SSDs have a much longer lifespan than your typical HDD thanks to the many differences in their composition, including the use of flash storage and the lack of fast-moving internal parts. By keeping these best practices in mind, you can take a great technology and make it last even longer, allowing your business to experience fewer replacement costs overall.

Does your business rely on SSD or HDD? If you’d like a chance to improve the way your organization functions, reach out to us at 800.394.2301.

0 Comment

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

When a security researcher tweeted about what they thought was “the worst Windows remote code exec” in his memory, a recent incident came to mind: one that allowed a targeted file to implement remote code execution processes in order to manipulate any infected system. This vulnerability let the infected machine spread the issue to others and could be set off if a certain file were to be scanned by the Microsoft Malware Protection Engine. Scary stuff!

0 Comment

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries