What is a ‘fringe’ device in IT?
For some, it’s a gadget everyone has forgotten about — a printer in a corner office, an Android tablet in a public area used to schedule conference rooms. A fringe device can also be one that’s common enough to be used in the office yet not so common that everyone is carrying one around or has one hooked up to the Wi-Fi every day.
As with any security concern, many of these devices are overlooked. There might be security policies and software used to track and monitor iPads and Dell laptops, but what about the old HP printer used at the receptionist’s desk? In a hospital, it might be a patient monitoring device. In a more technical shop, it could be a new smartphone running an alternate operating system.To read this article in full or to leave a comment, please click here
They sit off in the corner, some of them collecting dust. Yet, a printer is a legitimate attack surface. Many companies don’t bother to update the firmware on older models, or don’t include every model in a security audit (such as the one in the CEO’s office everyone forgot about), or the organization assumes a hacker won’t bother with an Epson or HP that is barely even connected to Wi-Fi.Interestingly enough, because a printer is so innocuous and seemingly harmless, that’s the exact reason it poses a threat, according to the security analysts who talked to CSO about this issue. Sometimes, the best attack vector for an attacker is the one no one bothers to think about. However, a recent IDC survey found that 35 percent of all security breaches in offices were traced back to an unsecured printer or multi-function device, costing companies $133,800 each year.To read this article in full or to leave a comment, please click here
They sit off in the corner, some of them collecting dust. Yet, a printer is a legitimate attack surface. Many companies don’t bother to update the firmware on older models, or don’t include every model in a security audit (such as the one in the CEO’s office everyone forgot about), or the organization assumes a hacker won’t bother with an Epson or HP that is barely even connected to Wi-Fi.Interestingly enough, because a printer is so innocuous and seemingly harmless, that’s the exact reason it poses a threat, according to the security analysts who talked to CSO about this issue. Sometimes, the best attack vector for an attacker is the one no one bothers to think about. However, a recent IDC survey found that 35 percent of all security breaches in offices were traced back to an unsecured printer or multi-function device, costing companies $133,800 each year.To read this article in full or to leave a comment, please click here
Smartphones have become more than anyone could have imagined. We use them as a communication device, to pull analytics reports, to connect with colleagues on social media, and even to help monitor core IT services. Yet, it can be hard to know which apps are the most valuable to keep around or rely on during a hectic schedule.To give you some ideas, CIO.com asked several CIOs which apps they use each day, the ones they rely on the most as part of their routine. Some of the apps they use are surprising (e.g., games to pass the time in a meeting) and some are more for personal use.Brad Schick, CTO and vice president of engineering at cloud service provider Skytap
1. SlackTo read this article in full or to leave a comment, please click here
Innovation takes time – and money, and people and resources. That’s why it’s common for a company to focus on core business activities and not build an innovation lab – a specific building or department dedicated to working on prototypes and fleshing out ideas. Part of the issue is that it can be difficult to justify and quantify the budget involved. Is it a skunkworks project that will consume resources but not deliver any value? Is it a purely a showcase for engineering prowess, or will the concepts produce real products? For many IT leaders, it’s hard to overcome the stigma of an innovation lab as a financial drain. “Innovation labs are regularly knocked because they often don't have clearly defined links to specific business strategies or goals,” says Charles King, an analyst with PUND-IT. “But that's also the basis of their appeal. In essence, innovation labs create a ‘safe’ space where an organization can explore unconventional, even radical ideas in hopes of inspiring changes or new opportunities that could enhance its business.” To read this article in full or to leave a comment, please click here