ContentWatch Security Blog


Feb 10, '11

I met with Mike Vizard, who writes for among other publications, and while we talked about a lot of things related to content filtering and bandwidth management, on desktops, from the cloud, and on mobile devices like tablets and smartphones, we somehow kept returning to the subject of DLP (Data Loss Prevention).

Data Loss Prevention is a big deal to companies who need to keep proprietary data, well, proprietary. And it turns out, deciding what content is proprietary and what isn't fits right into the same kind of technology that determines what content is inappropriate and what is benign.

Read the article here.


Jan 31, '12

Many companies are feeling the effects of employees bringing their own mobile devices to work. Employees are hoping or expecting to have the IT department help set-up or solve problems, configure email, connect to Wi-Fi, and much more.


Apr 1, '14

The 2014 survey from reveals that 89 percent of U.S. Employees waste time at work every day. There are a myriad of ways to waste time at work, and web surfing is a large contributor. The top three most-visited websites while at work are Google, Facebook, and LinkedIn.


Sep 12, '13

The Internet Crime Complaint Center (IC3) accepts complaints from Internet crime victims or from third parties to the victims. Each year they receive nearly 350,000 complaints. To put it in daily terms, 1000 people fall for online scams each day.  $350 million accumulated dollars are stolen from victims’ each year. Although people are becoming more tech savvy, scammers are still winning.


Feb 24, '12

I'm a dying breed. This President's Day while shopping, I considered upgrading to a smartphone, but chose not to. I may be one of the last who still uses a standard cell phone. We, who choose to remain smartphone-free, do not have to deal with issues such as expensive data plans or malware or rogue apps or cell phone hackers.


Feb 28, '12

Via smart phones, mobile sites, business applications and more, the consumerization of IT continues to impact the way employees use technology at work. Many organizations are shifting away from company-issued devices and adopting BYOD (Bring Your Own Device) policies, which allow employees to use the mobile technology they're most familiar with. There's a lot of buzz around the benefits of BYOD in an increasingly mobile workforce, but little discussion around the policies needed to establish rules and guidelines for usage.


Dec 8, '11

It's a fact.  Most IT Departments let anyone "bring their own device" or BYOD to work.  It started with the C-level group using iPhones.  Then, Android Phones became prevalent, powerful, and cheap. And, iPads and Android tabs are gaining momentum, either replacing a laptop or being used in addition to it.

Everybody's got a cool smart phone or tablet now and the ratio of these devices to PCs is going upside down.  In fact, one of the IBM creators of the first PC was quoted recently as saying “the PC is essentially dead, going the way of the typewriter and incandescent light bulbs. (Source: “With Spinoff, HP Looks Like IBM in 2005, Wall Street Journal, Aug 19, 2011).

The problem is that IT can't keep up with the cost of ongoing phone upgrades, increasing data costs, provisioning of duplicate devices for employees, data security risks and, more importantly, with the day-to-day management of these additional phones and tablets.  The tools to manage en masse are not here yet.

One glaring security challenge for IT is this… 82% of Small-Medium Businesses (SMBs) and 66% of large enterprises allow non-IT managed devices to access corporate resources. (Source: iPass Mobile Enterprise Report.)  That fact means your company data is at risk of loss.

Other security risks for mobile devices include malware and malicious apps.  Malware can infect your phone when you visit infected web sites -- which lead to data loss. Malicious apps can undermine other services on your phone, for example, to run up your text messaging count or costs.

Mobile viruses are not prevalent today due to the nature of mobile operating systems (the OS is very closed in the case of iOS and very open in the case of Android).

As time goes on, solutions for mobile protection and management will evolve and mature, to keep up with demand. The mobile security market is estimated to be in the multi-billion range and that means things are going to get exciting and tools are going to be here soon.

I work for ContentWatch and all opinions expressed here are my own.


May 13, '14

At the start of the New Year, Boeing initiated a new safety standard test at 25 plants. Typically, a company will raise their safety standards following a dangerous incident or a production mistake; however, this is not the case with Boeing.


May 17, '11

Shouldn't I protect my Android device from viruses, just like I do my PC?