David Abbou

Warning: This story may seem eerily familiar but is still terrifying to IT security and BYOD users nevertheless. Reader discretion is advised:

A recent survey of over 1,000 employees by email data protection firm ZixCorp produces some important takeaways that organizations would be remiss to ignore if they want a BYOD program that employees can actually get behind. 71 per cent of the employees surveyed said they would avoid using their personal phone out of concern it could be completely wiped should they lose their phone or leave their company. 20 per cent of respondents also admitted that they would wait a few days or longer to report a missing device out of fear of getting their device wiped.

There are several very important reasons why your company should wipe out remote wiping from its lexicon, but one reason is very simple: You don’t have to do it if you’re not saving corporate data on personal devices. While Mobile Device Management (MDM) and most mobile security solutions are still founded upon an approach that necessitates securing data already saved on the device, Virtual Mobile Infrastructure (VMI) runs a mobile operating system compatible with all Android and Apple devices, and instead stores all of the apps, files and data on a secured and remote cloud. You can access and work on all of these applications thanks to a remote display protocol which transfers them onto your phone as a flat display. This lets your employees check and respond to emails, access network files and use enterprise apps without saving any of the information on their device.

If there’s no data on the device to protect, there’s no need to remote wipe your employees’ phones and suffer the significant negative ramifications this causes.

The survey results spell out a very important fact that organizations should take heed of sooner rather than later: Remote wiping isn’t just a headache or employee concern – it’s a significant obstacle to implementing a successful BYOD policy for pretty much everyone involved.

Here are three main reasons remote wiping is a barrier to a successful BYOD program, and how using VMI technology can render these issues a moot point:

1) Remote Wiping is actually a security risk

It may seem strange to think of a security procedure as a security risk, but security measures are only effective when they earn the approval and loyalty of the people they govern. If one out of every five of your employees decided to ignore your BYOD policy and chooses not to report their missing device for a few days, a week or even longer, than that puts the corporate data sitting on that phone at risk. During this window of time, critical information can be stolen and used against your company’s best interests. A VMI solution means zero data is stored on the device. Ever. This means your employees are much more likely to immediately report lost devices. It also makes managing devices simple and stress-free for IT, which can easily disconnect the device’s access to the cloud.

2) Remote wiping is a burden to your IT security department

Mobile phones go absolutely anywhere and everywhere their owners go, and are therefore misused, lost or stolen more frequently than any other device. This adds an unnecessary demand on your security team’s time and resources to remote wipe compromised devices. VMI literally wipes away the hassle of remote wiping and let’s your IT team focus on projects that add value to your organization.

3) Remote wiping personal devices is a lose-lose BYOD solution for both management and employees

Your BYOD policy isn’t worth the paper it’s written on if it alienates your employees to the degree that they would avoid reporting missing devices, or even worse, avoid using their smartphones to access work resources. Your BYOD program is supposed to encourage participation and facilitate productivity, not deter it. The survey also indicated that employees were very concerned about their privacy, mainly giving their employer access to their personal information and control of all or part of their device.

Forward-thinking organizations should look beyond immediate security threats and short-term responses and visualize the bigger picture heading into the future, where user dependence on mobile technology is only going to increase. A successful BYOD policy needs to be designed in a way that not only secures your data, but enhances your corporate brand and reputation. Using a solution like VMI which removes the substantial threat caused by storing corporate data on personal phones, not only gives IT more security and peace of mind. It also removes the most important fears and concerns holding your employees back from embracing your BYOD program. This will empower them to take advantage of the core strategic benefits BYOD was meant to provide and increase productivity. Their support and loyalty will also boost your company’s credibility and raise its reputation that much more.

 

David Abbou

Size matters, it’s true – there, we’ve said it. At least it does if you want to get the most out of the sheer variety of smart devices available today, and it’s important to keep that in mind if you’re looking for a device that’s as practical as it is innovative. Here’s a snapshot of the types of devices available – from the ones small enough to dangle on your wrist to those mounted on your wall – that can help you stay connected and productive no matter where life or work take you. Read more about these technologies and the most popular solutions for each category after the infographic below.

Before you run out to your local Best Buy here are some things to keep in mind on the various devices and screen sizes and just how well they fit your individual needs:

Smart Watches

These devices are perfect when you’re driving and want to keep your eyes on the road, or are enjoying a jog and don’t want to reach into your pocket every time you’re facebooked or whatsapped. Many models such as the Pebble Steel let you control all of your music on your phone as well as count your steps, helping you get in the zone and rock out that workout. But if you don’t already own one, you may want to keep an eye out for the highly anticipated Apple Watch release, expected in early 2015. It’s expected to make a huge splash in the market and may well elevate the smart watch market to new heights. These accessories range in display size from 1.5 to 2.2 inches.

Popular choices: Apple Watch, Pebble Steel, Moto 360, Samsung Gear 2.

Mini Phones

Smartphones are getting larger and larger it seems, but if you’re a tech minimalist who still prefers using a phone to actually make calls (what a novel idea!) and fiddle with apps on your personal time, then mini phones will gain you more real estate and comfort in your pockets. Be prepared to give up some storage, power and processing capabilities, however. These phones carry display sizes between 3.5 and 4.5 inches.

Popular choices: HTC One mini 2, Galaxy S X Mini, Sony Xperia Z1 Compact, Samsung S5 mini.

Smartphones

The default lowest common denominator of the digital age. Regardless of any other devices you add to your repertoire, chances are you’re relying on one of these to browse the net, access apps, snap photos and post on social media. Today’s leading devices feature display sizes from 4 to 5 inches. If you’re going any bigger than you’re likely looking at a Phablet…

Popular choices: iPhone 6, Moto X, Galaxy S 5, Nexus 5, LG G2.

Phablets

Larger than a smartphone, smaller than a tablet, yet with comparable features and capabilities, this relatively recent mutation of the two could be an all-in-one solution, and an alternative to tablets, giving you the benefits of both in a smaller package. Phablets will give you a screen display anywhere from 5.5 to 7 inches. The emergence of the iPhone 6 Plus could help push phablets as the disruptive innovation that snatches significant market share away from the smartphone and tablet market.

Popular choices: Samsung Galaxy Note 4, iPhone 6 Plus, Sony Xperia Z Ultra, LG G3, Nexus 6

Tablets

Remember the good old days when kids were content just to run outside and play hide-and-go-seek? Yeah neither do we. Tablets are ideal for casual browsing, playing lightweight games and watching multimedia. Sales agents, restaurants and other service industries use these point-and-click devices to enhance presentations and customer experiences. Tablets range in display size from 7 to 10 inches.

Popular choices: Apple iPad Air & IPad mini, Samsung Galaxy Tab, Nexus 7 & 9.

Ultrabooks

Designed for thinness (usually under an inch thin) and lightness, these devices can be a great alternative to travelling professionals who want the technology without the bulk. You can choose from screen sizes between 11 and 15 inches and still enjoy most laptop capabilities.

Popular choices: MacBook Air, HP Spectre 13, Samsung Ativ Book 9 Plus, Toshiba Chromebook.

Laptops

If you’re a mobile-minded freelancer, laptops can easily serve as your only PC. Ideal for content-driven marketers or business consultants working remotely, you can select display sizes from 13 to 17 inches.

Popular choices: Apple MacBook Pro, Lenovo ThinkPad T440s, Dell XPS 15, Acer Aspire E1-510P.

Desktops

Still the preferred one-stop shop to get time-intensive work done efficiently, and easily access the full gamut of office applications and multimedia design programs. No longer the hub for innovation they also don’t need to be replaced nearly as much as their fast-evolving descendants, and are workhorses nevertheless. Branding is also much less critical – most office employees couldn’t even tell you what model they’re using. Leading models range all the way from 17 to 27 inches in display.

Popular choices: Dell OptiPlex, HP Pro, Lenovo ThinkStation, Apple iMac.

Smart TVs

Mainly used for larger than life on-demand TV, video streaming and gaming, but Skyping with your friends and family has never looked better! Great for game consoles.

Popular choices: Samsung Smart Hub, Panasonic Smart Vieira, Sony Internet TVs, LG Smart TV Class, Toshiba Cloud TV.

David Abbou

The United States Department of Homeland Security has sponsored National Cybersecurity Awareness Month since 2004, and the gravity of this important cause has never been more powerful. With Celebgate terrorizing celebrities and large-scale breaches against corporate giants like J.P. Morgan Chase, Wal-Mart, Home Depot, Target and Neiman Marcus, 2014 hammered home the importance of cybersecurity awareness to individuals and organizations alike.

Nubo Software CEO and Founder Israel Lifshitz agrees that an educated society is a safer one, and that the earlier we learn how to navigate safely in our interconnected society, the safer our worlds – both physical and virtual – will be as a result. Here Israel reflects on the ironic path that led him to champion this cause and develop Virtual Mobile Infrastructure (VMI) as well as the important responsibility individuals, corporations and government share in creating a secure future.

Q: When did you first realize that you were passionate about cybersecurity?

A: I started programming at the age of 10, back in the mid-80s, when there where was no such thing as cybersecurity. In the mid-90s, I started to encounter Information Security managers at work and the way they implemented measures was stifling to my productivity. I actually viewed them as a burden. When I was completing my studies at the Technion, my feelings started to change. I took courses in network security and encryption and my curiosity was piqued by how these technologies worked and protected important communications and data. After I founded SysAid I understood the problems faced by security officers and could relate with the challenges they faced trying to safeguard companies with many employees and critical data systems. I also recognized the contradiction that existed between managing security while trying to provide a quality user experience to your clients. It challenged me to find a way to provide effective security with uncompromised user experience.

Q: Was it this paradox which inspired the creation of Nubo Software?

A: It was definitely the paradox, and the huge gap that existed between user experience and security that I felt need to be solved, and it became an even more prominent issue when as BYOD became a reality for most organizations. This revolution was led by end users who demanded access to tools that they were familiar with as consumers. However, the security measures which IT felt compelled to implement acted as a barrier to providing employees with this flexibility. Nubo was born in order to solve this dilemma and provide the highest level of security and native user experience.

Q: There are various philosophies and approaches out there towards providing security for mobile devices. Why is it so important in your eyes that zero corporate data be stored on personal smartphones and tablets that employees bring to work?

A: It’s a fact that mobile devices are the weakest link to security in a BYOD environment. They’re owned by employees and therefore it’s impossible for IT to micro-manage them. By their very nature, they are mobile and routinely connect to many unsecured networks, and of course they are regularly misplaced and lost by users. If you multiply these scenarios by the millions of employees using BYOD, you can comprehend that even the best CISO in the world cannot ensure that their sensitive data won’t be leaked. In fact, most CISOs won’t even know these leaks ever happened. A security solution that can works on such a large scale must keep all corporate data within a secured and centralized location. This solution must also be able to grant employees the same user experience they are used to in working with native apps. The only solution that can provide both of these important requirements – zero data on devices and native apps – is Virtual Mobile Infrastructure (VMI).

Q: Why is raising awareness on cybersecurity becoming more important as our technology continues to evolve?

A: Technology is always evolving and companies’ are becoming more and more dependent on technology and digital infrastructure. This means that securing the data is increasingly more critical than ever before, and in many ways has exceeded the need for physical security. Banks are a great example of this. They store much less cash on-site than they actually keep within their databases, but have spent significant resources trying to protect physical assets. Over the years, however, their awareness to this reality has seen them devote more focus to protecting their systems from cyber attackers.

Q: If this is the case in private sector, how much more vital is it to use the highest possible level of security at the government level?

A: Businesses that lose client data and money as a result of security breaches is one issue, but when you’re speaking about national security, we are talking about the lives of millions of people potentially at risk. Military and defense agencies are facing a wide variety of cyber threats in parallel to the existing physical threats they already deal with. With these stakes on the line, there simply isn’t any room for error and you need to ensure that the most sensitive data is kept where it’s safest.

Q: While public awareness campaigns like National Cyber Security Awareness Month help educate the public on security, there is a notion that consumers and BYOD users are way behind the learning curve. How can we better educate people to be more security conscious?

A: I agree wholeheartedly that education and awareness are vital to improving the overall landscape for everyone. In our interconnected world, we really are all in this together. High-profile breaches like the iCloud breach have caught taken the public spotlight. The lesson that individual users should take away from that incident is that having a mobile computer at your disposal 24/7 comes with its responsibilities. We used to feel as consumers that using safety measures was optional, but we can’t afford to think that way any longer. It’s important that everyone – and of course BYOD users learn and apply the ABCs of cybersecurity measures. I believe the day is coming soon where learning about cybersecurity will be a mandatory course for even high school children.