ITWorldCanada lists the 8 most dangerous consumer technologies...and what companies are doing to make them more secure or easy to support or in some cases not allow them in...
Instant Messaging Web Mail Portable Storage devices PDAs and Smartphones Camera Phones Skype and other consumer VoIP services Downloadable widgets Virtual worlds
you can add wireless hotspots, stolen laptops and several other potential areas of risk and "leakage"
Update: Of course, users automatically assume IT/CIO is the bad guy. Network World has an article which shows CIOs and Chief Security Officers often have an adversarial relationship.
ITWorldCanada lists the 8 most dangerous consumer technologies...and what companies are doing to make them more secure or easy to support or in some cases not allow them in...
Instant Messaging Web Mail Portable Storage devices PDAs and Smartphones Camera Phones Skype and other consumer VoIP services Downloadable widgets Virtual worlds
you can add wireless hotspots, stolen laptops and several other potential areas of risk and "leakage"
Update: Of course, users automatically assume IT/CIO is the bad guy. Network World has an article which shows CIOs and Chief Security Officers often have an adversarial relationship.
One person's meal is another's poison
Consumerization of IT? Sure...but not without controls.
ITWorldCanada lists the 8 most dangerous consumer technologies...and what companies are doing to make them more secure or easy to support or in some cases not allow them in...
Instant Messaging
Web Mail
Portable Storage devices
PDAs and Smartphones
Camera Phones
Skype and other consumer VoIP services
Downloadable widgets
Virtual worlds
you can add wireless hotspots, stolen laptops and several other potential areas of risk and "leakage"
Update: Of course, users automatically assume IT/CIO is the bad guy. Network World has an article which shows CIOs and Chief Security Officers often have an adversarial relationship.
September 14, 2007 in Industry Commentary | Permalink