We all know that computers and laptops can get viruses, malware, and ransomware, but what about smartphones? This blog will cover how to detect infected BYOD devices on your network.
Read moreCategory: BYOD
Do you know how much of your company’s bandwidth is being used for BYOD and phone updates?
Do you ever feel as though no matter how much bandwidth you buy, it still isn’t enough? Phone and BYOD updates can use a large amount of bandwidth; here is how to figure out just how much.
Read moreDetecting a Jailbroken iPhone with Wireless Monitoring
This month, Citizen Lab uncovered some incredibly sophisticated malware that takes advantage of three previously unknown vulnerabilities, now known as Trident, in Apple iOS. The malware, which is worth as much as one million dollars, essentially jailbreaks the affected iPhone and allows the culprits to steal all of the user’s information. It intercepts every call and text message, captures emails, contacts, data from Facebook, Skype, WhatsApp—everything you would use for communicating. The malware is activated by simply clicking on a link that the hackers send you. Now, when people carrying infected iPhones bring them to work and connect to the corporate network, it becomes clear that we need a way of detecting a jailbroken iPhone.
Monitoring BYOD devices with NetFlow
Monitoring BYOD with Netflow is becoming a huge concern on most people’s networks due to the added network load as well as the new security risks that they may pose. In this blog I hope to shed some light on some of the new features that Cisco has recently come out with to help track behavior on the network. Read more
100 Universities Hacked: Time For a Change in Network Security Philosophy?
A hacktivist group calling itself Team GhostShell has claimed responsibility for leaking 120,000 records from more than 100 higher-education networks. Team GhostShell claims the attacks were carried out in an attempt to “bring attention to failing educational standards worldwide.”
From the looks of it they were quite successful. The story has been picked up many times with dozens of articles discussing it.
I don’t want to get into a debate on world-wide educational standards, but I do think there is a serious discussion to be had around higher education network design, policy, and network security methodology.
BYOD Policy Essentials: Trust But Verify
The IT Consumerization or “Bring Your Own Device” (BYOD) movement is already well underway and the iPhone5 launch will see even more employee sourced devices hitting the enterprise network. Even if you’re lucky enough to work for a company that provides iPhones to their employees, you probably don’t want to wait for IT to upgrade your iPhone now do you? You’ll want to BYOD.
So in support of iPhone5 users everywhere, here are three essential components of a BYOD-ready company: Policy, Education, Technology. Let’s discuss…
Top 5 Uses of NetFlow for Network Security
There are many uses of NetFlow but one of the most important and often overlooked is the network security value NetFlow and IPFIX can provide. Based on feedback gathered over 10 years from hundreds of NetFlow customers, here’s the top five uses of NetFlow analysis for network security in ascending order…
Read more
Network Behavior Analysis : Business Internet Security Systems
Most companies agree that business Internet security systems are a paramount concern. Relying on traditional security efforts such as firewalls and antivirus software are not going to perform a very important emerging security detection technique called network behavior analysis. To leverage this internal security measure, network administrators need to collect and analyze NetFlow or IPFIX from existing routers and switches. And here’s some good news: firmware upgrades are usually not needed to take advantage of flow technology.
Mobile IAM: Network Access Control and BYOD Reporting
I’ve been playing with our joint Mobile IAM reporting solution that we have developed with our partner Extreme Networks. These new reports appear to be very helpful when trying to find out about all the BYOD devices on the network, who authenticated them (i.e. username) and any BYOD security issues that may have appeared in the host reputation alarm dashboard.
BYOD Policy and Network Monitoring: Mobile IAM
What is your company’s BYOD policy? Do you have one? Does BYOD traffic monitoring exist in your network monitoring routines? BYOD policies need to be put in place as this new technology paradigm is costing most companies BIG TIME!