Zix Blog

What does Winston Churchill’s Foot Tell us About Mobile Security?

Mon, 01/04/2016 - 11:57 by Neil Farquharson
Most people will recognize the name of legendary wartime leader Winston Churchill: As well as having a United States Navy destroyer named after him , he is one of only eight people ever to have been proclaimed an Honorary Citizen of the United States . One of the many bronze statues of Churchill is at the south entrance to the lower chamber of the British Parliament in London; and for many years, Members of Parliament (MPs) entering the voting chamber would rub the left shoe of the statue for luck, in the hope that their government bill would pass. You wouldn’t think that rubbing your hand...
Read More

David Kennedy Interviewed about Mobile Devices

Mon, 11/30/2015 - 10:27 by Neil Farquharson
On November 11 th , I had the pleasure of interviewing security expert David Kennedy during a live webcast. David is a regular speaker at security events and famous for co-authoring Metasploit: The Penetration Testers Guide ; and for co-authoring the Penetration Testing Execution Standard (PTES), a framework used by the penetration testing industry. He’s also spoken twice in front of congressional hearings on the subject of network security. During our 40 minute interview, David had much to say on the subject of mobile security, particularly the ease with which BYOD devices that rely on...
Read More

Manage Holiday Stress with BYOD

Mon, 11/09/2015 - 13:04 by ZixCorp
It’s that time again. Hectic parking lots, crowded malls and full social calendars — the Holidays are officially upon us. Besides some well-deserved — and likely much needed — time off, what’s the best gift an organization can give to its employees? Many would agree that having the ability to take time off without coming back to a deluge of emails and to check into the office with minimal disruptions to quality family time — or the ability to BYOD — is quite the gift. With BYOD, employees are no longer restricted to the walls of their offices or tied to their laptops. Email, documents and...
Read More

Why Businesses Should Not Trust Remote Wipe or Kill Switch Commands

Fri, 10/23/2015 - 11:17 by Neil Farquharson
I’m becoming increasingly concerned that businesses are relying on the remote wipe instruction to protect their data. Articles like this one from CNET talk about the new Californian law that implements kill-switch functionality on smartphones, while a multitude of articles such as this one from the New York Times espouse remote wipe functionality. However, as I explained in April , these solutions are way off base and do not truly protect company data. Let me explain. The reason for the kill-switch is to deny the thief the future use of the stolen phone. This makes perfect sense to the...
Read More

Zix’s Hacker Series Continues: David Kennedy on Mobile Devices

Thu, 10/22/2015 - 11:15 by Neil Farquharson
Regular readers may remember this blog referring to the ease with which hackers can intercept emails being transmitted over unprotected fiber optic cables. I’m now pleased to share with you that David Kennedy, the renowned security expert, has agreed to be interviewed during a live Webinar scheduled for November 11 th at 2 p.m. ET. During the interview, I will ask David for his views on the current security levels of mobile devices such as smartphones and tablets. Just how easy is it to compromise mobile devices remotely, or while in the physical possession of hackers? Can operating...
Read More

ZixSelect Mobile: End-to-End Encryption for Mobility

Wed, 09/09/2015 - 15:36 by Neil Farquharson
ZixSelect Mobile has created quite a buzz within the Zix customer base. IT and security professionals are already familiar with ZixGateway, an automated method for monitoring outbound emails in real-time that takes immediate action to secure any sensitive information contained in these emails. The concept is well understood: policy filters are specially tuned for each business type. This means that employees can get on with doing what they do best – their jobs – without stressing about email security. CISOs love the model because it removes human error from the equation. ZixSelect...
Read More

Securing Mobile Devices with the Remote Wipe Instruction – Or Not!

Thu, 04/02/2015 - 10:49 by Neil Farquharson
I’ve just been reading through technical notes that come with a big brand mobility solution. I won’t embarrass them by using their name, however one of their key statements is “If you lose the mobile device, you can use the remote wiping feature to prevent someone from obtaining your personal information from the device.” The notes continue on by giving the instruction sequence to follow to send the remote wipe instruction to the lost or stolen mobility device. Another big brand website is a little more honest about lost or stolen devices: “If your device is...
Read More

Working weekends, nights or during the holiday? You aren’t alone …

Wed, 12/17/2014 - 10:37 by ZixCorp
While it has been said that the holidays are best spent in the warm embrace of kith and kin, this season, 57 percent of full-time employees in the U.S. will spend at least part of their holiday break clutching laptops, smartphones and tablets to catch up on work. In a recent study, ZixCorp asked more than 1,000 full-time employees about their work practices outside of their regular “9 to 5.” The survey explored not only how much time employees spend working outside regular business hours but also how they are accessing work outside the confines of corporate walls. Let’s take a look at some...
Read More

10 Commandments of Email Encryption

Thu, 11/20/2014 - 10:47 by ZixCorp
At no time in history has personal and corporate data been more widely targeted by criminals. With never-ending threats and compliance demands, it’s vital for IT and employees to work together to create the most secure environment possible. When both sides are on the same page, an organization is at its strongest. To help with the cause, we wanted to provide ZixCorp’s “10 Commandments of Email Encryption” that highlight the responsibilities of both IT and employees to ensure data being transmitted from an organization is secure. IT Commandments Thou Shalt Educate Unless your email encryption...
Read More

Upcoming BYOD Webinar: State of Mobile Security in 2014

Mon, 07/14/2014 - 11:14 by ZixCorp
What BYOD challenges, security risks and technologies are companies responding to in 2014? Find out by joining our webinar on July 15 at 2:00 p.m. ET when we showcase findings from the recent BYOD & Mobile Security Spotlight Report conducted by Holger Schulze of Information Security Community. More than 1,000 IT decision makers were surveyed about the mobile threats facing their organizations and the BYOD solutions and strategies being used to combat them. During this webinar, Holger and ZixCorp expert Geoff Bibby will discuss new BYOD insights, surprising trends and fresh perspectives on...
Read More

Pages

Subscribe to RSS - mobile security

Switching to Zix Just Got Better

50 percent or more off your first year when you switch to Zix Email Encryption by Feb. 28, 2017, from an eligible competing solution.

Learn More