exchange email archiving January 11, 2012

Little bit apocalyptic picture, but great post.

Malcolm James January 11, 2012

It IS 2012… :)

Nate January 12, 2012

Mobility Means Vulnerability – does this specifically relate to the vulnerability of the computing platform (such as cloud computing) or the hardware / software (the smartphone itself)? I’m keen of getting a new smartphone this year. I think I’ll buy the latest iPhone 4s. Aside from personal use, I will also utilize this phone to access my work emails, files, and other data. My company has a cloud computing portal that stores all work-related files.

My biggest concern with this setup is security. I’m very aware of several vulnerability issues mobile devices bring – spams and viruses plus hacks. I’m just not sure if cloud computing would be more stable or less secure if I use my smartphone also at work. Can you give me advises or points to consider regarding this matter?

Malcolm James January 12, 2012

Hi Nate,

To answer your first question, it’s a little bit of both. Cloud computing presents security concerns since the data is ‘out there’ in the cloud, but as long as proper security procedures have been adhered to and there is sufficient security in place, you can expect it to be about as safe as your LAN/WAN. Smartphones are a different issue, since they provide several things to watch out for. The two biggies – Android and iOS – have both been shown to be susceptible to threats. I myself am a recovering iPhone user. I have several Android devices and have purchased security software for all of them. Furthermore, Android allows you to disallow the download of software from unverified vendors, something which provides a little additional peace of mind.

Since you’re looking at the iPhone, however, as long as you’re careful about what you download and adopt the same approach as you would with your computer (don’t open e-mail attachments from suspicious sources, think twice before responding to anything – e-mail or SMS, take the same precautions when browsing the Web that you would when sitting at your desk), you should be fine. Really, the best advice I can give about mobile devices connecting to a company network: first, treat it as you would any PC in the office. Like PCs, it has an IP address and a MAC address, so ensure that its activity is monitored like any other device. Second, ensure that it’s used properly. User error is a key concern for any network and the only reason unsafe attachments get opened.

Harry Belaude January 16, 2012

I think the first point made here has a huge potential for possibility, especially considering the war against SOPA. If that bill passes, there’s going to be a high number of American users who will lash out by striking fast and hard on whichever group happens to catch their ire. It doesn’t help that in this phase, support for or against the bill has been very public on both sides.

Yardley Coleman January 18, 2012

Have you considered some variables here relating to the Stop Online Piracy Act (also known as SOPA) and its effects to the World Wide Web, tech-based businesses, and Internet users in general?

Your predictions about hacking, spamming, phishing attacks, mobility, and online security are nothing compared to SOPA. If this bill is passed and will become a law, it will have a tremendous impact to all of us. It will signal the end of the Internet and free speech.

  • (required)
  • (required)