ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Tools for Teaching-People and Learners
Scoop.it!

The Security, Privacy and Legal Implications of BYOD

The Security, Privacy and Legal Implications of BYOD | ICT Security-Sécurité PC et Internet | Scoop.it
The Security, Privacy and Legal Implications of BYOD


Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable.

 

Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. Many companies are having to play catch-up to control these risks.

 

===> This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations. <===

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Why Security is in Trouble

Why Security is in Trouble | ICT Security-Sécurité PC et Internet | Scoop.it
Why Security is in Trouble
Everything you do as an infosec leader needs to be aligned to your organization's mission statement and goals.

 

 

 

 

                             ===> A MUST READ!!! <===

No comment yet.
Scooped by Gust MEES
Scoop.it!

Vague Cybersecurity Legislation Threatens Civil Liberties

Vague Cybersecurity Legislation Threatens Civil Liberties | ICT Security-Sécurité PC et Internet | Scoop.it
Vague Cybersecurity Legislation Threatens Civil Liberties


Using cryptography to protect communications could be taken as a way to defeat an operational control.

No comment yet.
Rescooped by Gust MEES from IT Security
Scoop.it!

Ten Ways to Handle Insider Threats

Ten Ways to Handle Insider Threats | ICT Security-Sécurité PC et Internet | Scoop.it

Tough economic times make it tempting for an employee to switch his white hat to a black one for financial gain. Insider threats also include contractors, auditors, and anyone who has authorized access to systems.

 

Read more, A MUST...

 


Via IS Decisions
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Positioning the Security Team Through Influence Part 1

Positioning the Security Team Through Influence Part 1 | ICT Security-Sécurité PC et Internet | Scoop.it
Positioning the Security Team Through Influence Part 1
The essential approach to enhancing the role of security professionals is to enhance their organizational influence.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Obama Unveils Blueprint for Online Privacy Bill of Rights

Obama Unveils Blueprint for Online Privacy Bill of Rights | ICT Security-Sécurité PC et Internet | Scoop.it
Obama Unveils Blueprint for Online Privacy Bill of Rights The Obama Administration today unveiled a “Consumer Privacy Bill of Rights” as part of a comprehensive blueprint to improve consumers’ privacy protections and ensure that the Internet...
No comment yet.