Most organizations understand that breach response and vulnerability disclosure are a huge part of the security process. However, despite the disclosed breaches, organizations continue to miscalculate or underestimate the risk caused by mobile.
The business world is quickly embracing the concept of cloud computing.
A recent study forecasts that “spending on cloud computing infrastructure and platforms is expected to grow at a 30 percent compound annual growth rate from 2013 through 2018, compared with 5 percent growth for the overall enterprise IT.” This is in part because of the cost savings it brings.
For instance, why shell out big bucks for an in-house IT department when you can simply rely on the technicians at the remote server location at half the cost?
The number of data breaches caused by mobile devices has significantly increased in the past years. And mobile devices are already considered as the weakest link in the security framework.
TNT is one of the world’s largest express delivery companies. On a daily basis, the company delivers close to 1 million consignments, ranging from documents and parcels to palletized freight.
Some users are dropping content into the site willy-nilly. For others, it takes days or weeks to find how to access to anything. The structure is all wrong, making it impossible to find anything. In short, the so-called power user in Office 365, or even on Exchange online, might easily become an IT administrator’s or manager’s worst nightmare.
In a perfect word, a true power user has a near-admin level of access rights, allowing him or her to manage access, add new lists and libraries, and reorganize content. However, the most common mistake made by site admins is misunderstanding permission inheritance and privilege (the concept that rights granted to an object higher up in a hierarchy also apply to the objects below it).
Mobile devices are widely adopted in the world of business today. Moreover, they have taken on mission-critical status for most enterprises.
According to John S Chen, CEO at BlackBerry, and based on result of a survey of 800 CIOs and risk and compliance leaders*, “the number of data breaches caused by mobile devices had significantly increased in the past years. Mobile device is already the weakest link in the security framework“.
Creating mailboxes for new employees or shared mailboxes can quickly become a storage problem; as messages pour in and start to pile up, huge quantities of data storage space are consumed. These deprecated mailboxes also can pose security threats, such as containing emails with malicious code that don’t even need people to be executed. If you are running on a limited number of Office 365 licenses, deprecated mailboxes could take up spots which you could be giving to new employees to maximize your company’s productivity.
Your company is using unified communications applications like Exchange, Office 365, SharePoint, Skype for Business, IBM or BlackBerry? Hosted On-premises, in Hybrid or in the Cloud?