Yahoo Answers is shutting down on May 4th, 2021 (Eastern Time) and beginning April 20th, 2021 (Eastern Time) the Yahoo Answers website will be in read-only mode. There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page.
Trending News
How do businesses keep data secure with android phone & tablets?
My main concern is email and contacts. We run a Microsoft Exchange 2013 server here at work. Exchange allows me to completely wipe a device for a user that leaves or is terminated (sweet feature.) However, users can have their devices set to backup contacts and other data to their own personal google account online. So even if I wipe the device, they can still get their contacts online.
I’m just curious how corporations are handling this security issue.
4 Answers
- 7 years agoFavorite Answer
It is a mixed bag, and a nightmare.
Basically a choice:
1) users BYOD (bring your own devices).. and they get to tweak them, possibly putting corp data at risk. Company saves on equipment and subscriber fees, but could lose down the road in a data breach.
2) users are restricted heavily, and can only keep company data on company-owned & controlled devices. Heavy cost of hardware and support, but a good defense against liability if data breach happens.
3) .. something in between.. BYOD, but make users submit to a lot of rules and company security configurations. Not perfect, but it gives some deniability to company as long as users can be 'blamed'.
Generally - we can't all stop users from bringing some of their own tech in. If it makes them feel empowered and more productive - well, the IT folks like us are supposed to enable better work through tech.
Only if company data is extremely sensitive, and cannot be encrypted, access limited, or wiped through BBM or EXCH serv er.. then the CxO and legal folks need to decide where to put the funds for equipment and support/security.
In my little corner of the world, we gave up on trying to restrict everything long ago. We've locked down critical systems - HR, benefits, credit/billing, purchasing -- and users can only access key info from on-site workstations, on private IP-space, AND they go through annual training & sign a form that they understand the serious nature of data. Basically, we selectively secure the most critical data.
Source(s): IEEE, LOPSA, SANS, experience - JimLv 67 years ago
Hackers recently hacked the USA's PAC-3 Patriot missile system, the Army's Terminal High Altitude Area Defense system, the Navy's Aegis ballistic-missile defense system, the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the Navy's Littoral Combat Ship.
I don't mean to be rude, but you're worried about email contacts? Hackers can hack just about anything, especially if they are already in your company.
- Anonymous7 years ago
Online fax/cloud storage is great – it’s inherently secure so you can send sensitive information, which you shouldn’t with email. Services like Sfax (http://www.sfaxme.com/) are HIPAA-compliant, which adds extra layers of protection.
If you do opt for BYOD, check out some guideline you'll need to follow to avoid data security breaches.
- ?Lv 77 years ago
wow jim i thought i was one of the few who read or was in the know , next is your climate control system for your house hahahahaha
get your head out of your social site and start paying attention to the world you phone tab and comp is at risk
live free , fast and you get burned