You will find below what you need to know about unlocking employee mobility and productivity with wireless network solutions for BYOD.
Thanks to BYOD —the Bring Your Own Device policy, which allows workers to conduct their business tasks from their personal devices—employees are freer, more mobile, and more productive than ever before.
Freedom and Flexibility ≠ Facebook Believe it or not, allowing your employees to connect to the business network from their personal laptops does not mean that they’re spending all of their time on non-work related tasks. In fact, the freedom and flexibility allowed by BYOD dramatically increases productivity. Here’s how.
1. When an employee uses a device that he or she is already familiar with, that worker requires minimum technical training. Because the employee already knows how to use the device, there is little to no frustration that comes with learning new software.
2. By using a personal device—especially a phone or a tablet—employees are choosing to take their work home with them. And because they can connect from anywhere, their work is easily accessible. That means they can log in on their ride into work, over lunch, and after hours. And they do. (See below).
Because of the comfort of using their own devices, as well as the convenience of being able to connect from anywhere, employee morale skyrockets with BYOD —and so does productivity. Employees are doing much more than surfing through social networks on their personal devices: according to Dell, they’re actually adding over 240 hours of work…each.
Unlock Productivity with Preparation and Management. In order for your organisation to reap the benefit of productive employees with BYOD in your company, you must first know what kind of devices your employees are using. Then, of course, you have to manage all of those devices once they’re on your network. Here are a few solutions to consider when you’re starting out.
1. According to the Dimensional Research Survey of IT professionals, an overwhelming number of employees (78% to be exact) use Apple devices. Apple devices can easily be configured to allow users a secure connection to the company network. Several other, non-Apple devices also allow for similar, secure configuration. In any case, it’s of primary importance to know which types of devices employees prefer to use, and which types are supported on your network.
2. No matter which device employees use, the company network needs to be prepared, lest it become congested and sluggish. The best way to avoid slowdowns is to put the proper solutions in place beforehand. For example, if the network doesn’t have the bandwidth to support several mobile devices, your service provider may suggest a business Ethernet network in order to share network resources via an existing infrastructure. Other solutions include defining the maximum amount of bandwidth that Internet sites, cloud apps, and users can consume. It all depends on the needs of your business.
What is important for employers and IT professionals, then, is to keep tabs on when employees wish to switch out their devices for different brands or upgraded models. Employers must take into account the device’s compatibility, as well as the amount of bandwidth needed to support new devices.
At LAN2LAN, we can help you design and implement wireless network solutions that will unlock your employees’ productivity and allow them to reach their full potential.
Not only will we make your transition to BYOD flawless, but also we’ll continue to help you manage users after you get there.
Call us today on 0870 787 4001 or email firstname.lastname@example.org to find out more about what we can do for your organisation.
Angela Nightingale February 20th, 2014 08:14:47
Stay up to date with Cloud computing by visiting LAN2LAN at Cloud Expo 2014. Cloud Expo Europe 2014 rolls in town next week. It’s jam-packed with world-class cloud experts and a major exhibition featuring over 200 cutting edge suppliers. Plus 300 expert speakers in a compelling conference and seminar programme covering all the key issues.
It’s an opportunity to see all the latest Cloud developments for free at the ExCeL Exhibition Centre, London on the 26th & 27th February 2014.
Click here to register:
Big Data will be a major focus at this year’s Cloud Expo. LAN2LAN is involved on stand 1011 with distribution partner Big Technology who is also sponsoring the Big Data and Analytics theatre. LAN2LAN are showcasing the WAN optimisation and Data Acceleration technologies of Silver Peak.
Big Data requires greater speed and higher capacity. Silver Peak WAN optimization overcomes network performance challenges and lowers ongoing WAN costs through virtual flexibility and capacity. Silver Peak’s Virtual Acceleration Open Architecture (VXOA) combines groundbreaking optimisation techniques with flexible deployment models and pricing to make data acceleration easy and cost effective.
LAN2LAN Consultants will be available on stand 1011 to showcase the products and discuss first hand the contribution Silver Peak solutions are making to organisations around the globe.
Angela Nightingale February 19th, 2014 08:55:56
The financial and productivity benefits of VoIP (Voice over Internet Protocol) and Unified Communications (UC) are being realised. Organisations are also experiencing unexpected returns for collaboration solutions as employees can work anytime, anywhere, and collaborate more effectively with colleagues, customers, and partners.
As we experience unprecedented levels of The financial benefits of VoIP and Unified Communications disruption to travel due to the worst rains in living memory, VoIP is at the spearhead of the UC trend because of its domestic profile. IP telephony has increasing acceptance in the personal domestic markets through providers such as Skype. Just like Apple with BYOD, Skype’s domestic VoIP is having an influence on organisational decision makers. They are seeing the savings on domestic call charges and asking why can’t this be achieved at scale within organisations? The answer is it can.
The technological tipping point has also been reached, such that VoIP can now compete, and exceed, in some cases, the quality of landline copper wire connections. The provision of seamless switching between VoIP and wire ensures continuity at all times. The call quality and constant connectivity combined with the reduction in cost is proving irresistible for business leaders.
Reducing call costs
A VoIP solution in a fixed location will deliver a financial benefit against traditional fixed line telephony. However, as mobile telephony is the highest cost for many organisations a holist Unified Communications solution is more commonly required.
Dual-mode smart phones, which automatically switch from expensive mobile services to a corporate wireless LAN whenever available are a solution. ShoreTel Mobility is designed to reduce mobile costs with the ability to automatically select the most cost-effective method of routing calls. This user-driven and location-based presence information helps customers and employees reach key contacts exactly when and where they need to.
A Mobility solution can dramatically reduce the most expensive mobile bills by effectively shifting mobile minutes to Wi-Fi minutes, by leveraging dual-mode smart phones and WLAN networks in a viable way to reduce enterprise mobility and communications spend. Not only does this deliver immediate cost savings it also offers the convenience of a single number and handset for employees and their customers.
Return on investment
According to research amongst the customers of industry leading VoIP provider ShoreTel, many are seeing a return of investment within a year. More broadly by unifying its communications an organisation can generate company-wide cost reductions by freeing valuable IT resources to work on strategic projects. Over the long term, benchmark data by the Aberdeen Group shows ShoreTel offers the lowest total cost of ownership in the industry for its UC solutions.
What is Unified Communication?
Unified communication (UC) is an application that integrates phone calls, voice messaging, instant messaging, presence information, and web-based conferencing sessions on the employee's laptop, tablet or smart phone, making it easy to communicate over any network connection from any location.
UC allows an individual to send a message on one medium and receive the same communication on another medium or device. For example, receiving a voicemail message and then deciding to receive it through e-mail on a smart phone. The combination of real-time and non real-time communication allows the employee to manage their communications around their workload and location, whilst still being responsive to those wishing to reach them.
UC is not a single product per see, but a suite of products that provides a unified user interface and experience across multiple devices and media types. The aim of UC is to provide solutions based on new communication technologies (voice, video, chat and email), as well as new work places and processes.
These solutions empower employees to work more efficiently, productively and be able to collaborate with their colleagues, customers and partners literally anytime and from anywhere. So whether they’re stuck on the 17.30 out of Paddington station, waiting for the Seven Bridge to reopen or working from home to avoid traffic chaos, VoIP and UC provides seamless connectivity and business continuity. Employees are ever present in the office as far as a customer is concerned.
Business benefits of Unified Communication (UC)
- Enhancing the network for collaboration
- Helping employees work anywhere
- Flexible work schedules and access to company resources outside regular business hours
- Redesign of the office and the organisations space requirements
- Reducing travel costs
Discover more about UC
LAN2LAN is an Authorised Partner for ShoreTel’s Unified Communications (UC) and Mobility solutions. ShoreTel Mobility extends the full power of a desk phone and UC capabilities to a mobile and sets users free to communicate from any location (office, home, hotspots) by enabling access via any network (mobile or Wi-Fi), simply and cost effectively.
For information about accessing the business and financial impact of IP Unified Communications systems, please click here to read this whitepaper
If you would like to understand the financial benefits that VoIP or UC can bring to your organisation, please contact us today on 0870 787 4001 or email email@example.com
Angela Nightingale February 17th, 2014 11:12:02
Lord Justice Leveson isn’t the first name that springs to mind when you consider network security solutions. In fact voice data security, the basis for the “hacking” inquiry, is rarely considered at all. According to a recent survey by network security solutions provider LAN2LAN only a single digit percentage of IT professionals said they’re organisation had specific security in place for their voice data.
It is clear that while organisations are planning or actively implementing Voice over IP (VoIP) and Unified Communication (UC), many are not fully aware of the security risks associated with those applications.
However, a lesson from Leveson is that voice data is easy to exploit and can be used to significant commercial advantage or criminal ends. In fact, a breach of a VoIP application represents a more attractive cyber attack target than a data application as there is the potential for direct financial gain through call fraud. Call fraud is estimated to cost £24 billion per annum, with many organisations unaware that they’ve been the subjects of a cyber attack until months later.
Although overlooked, it is a relatively simple process to implement VoIP and UC data security. It starts with a simple risk assessment from a network security solutions provider like LAN2LAN. This is the first step in identifying voice data on your organisations “risk register” and determining its priority relative to other vulnerabilities. Typically it proves a low risk financial decision to mitigate a high-risk problem.
VoIP and UC are Internet Protocol (IP) Applications and therefore face IP security threats. Traditionally protection is provided by Session Border Controllers (SBC) which deliver security measures alongside managing quality and connectivity issues. However with the growth in remote connectively, new products are emerging to address the broader security needs of the cloud. UM Labs “platform as service” is one such product. This 21st century security technology is being provided through its Cyber Security partner LAN2LAN.
UM Labs “Platform as a Service” offers a new and higher level of protection for SME and major corporate users who are now using Unified Communications at an ever-increasing rate.
The speed of implementation and inter-operation with UC solutions such as Cisco, Avaya and Shortel mean UM Labs Unified Communication security is suited to private or public cloud implementation. The full benefits of UM Labs 21st century security solution and a comparison to legacy Session Border Controllers (SBC) is available to download here
LAN2LAN, are specialist in secure systems integration, installation and project management. We focus upon driving technologically innovative solutions that deliver intelligent enterprise wide networks for the needs of businesses today and in the future. As a result of our Enterprise and Government projects CIO’s are evidencing the value of making a low risk financial decision to cover a high-risk problem in fraud, eavesdropping, disruption attacks and new criminal intrusions into their UC environments.
Contact LAN2LAN today on 0870 787 4001 or email firstname.lastname@example.org to find out how we can help you improve your VoIP and UC security.
Angela Nightingale February 4th, 2014 10:30:38
At LAN2LAN, we’re always on top of the latest research. When a new white paper from the mobile and marketing experts at Lopez Research came across our desks, we couldn’t have been more excited. You’ll find select information from the report below, but we encourage all of our readers who are interested in wireless network solutions to have a look at the full document here.
Entitled “The New World of Mobility Management,” Lopez's research focuses on the coming changes to business as a result of mobile technology. The report explains that while mobile technology has made the lives of customers and employees easier, it has made the day-to-day job of IT leaders much more complex.
How far along is your company in adopting wireless networking solutions? The Lopez report breaks down the process of corporate integration of mobile devices so you can see where your company is at – and so you can know what to expect in the future. Those phases are:
Angela Nightingale January 27th, 2014 15:28:25
Long gone are the days of feeling safe online by simply running anti-virus or downloading the latest security patch. There are over 5 billion mobile customers worldwide today – and when technology changes, security breaches are never far behind. Because mobile technology is the future of business, it’s important for IT professionals to have the right network security solutions in place.
Here are a few things that IT professionals should bear in mind when considering the proper security measures for their organisation.
The risks. The security risks for mobile devices just might surprise you.
- The biggest threat to security is not malware…yet. According to Gartner, the greatest risk for a security breach is when a mobile device is stolen. Malware may be in the future, though, so it’s important to stay informed about which devices and apps pose the greatest threat.
- Mobile devices are vulnerable to malware, but it’s not as bad as you think. Mobile device malware is different from the malware that attacks computers and laptops. That’s a good thing. While viruses, worms, and other malware can unleash web-wide infections, there is no self-replicating virus for mobile devices. Mobile Apps are curated by App stores, which currently provide a barrier to contagion. Whilst a phone can be changed at an administrative level (via rooting an Android or jail-breaking an iOS device), it’s currently very difficult for malware to infect mass amounts of users at once.
- Most users don’t know the difference between safe, malicious, and vulnerable apps. Even though app stores are highly secure, they are not immune to malicious or leaky apps. Because most users don’t know the difference between apps’ security measures, they may be inadvertently putting company data at risk.
The solutions. There are several network security solutions that IT specialists can implement to ensure that their information is safe.
- Be clear with your users. Employees are generally thrilled with the BYOD (Bring Your Own Device) option that allows them to use their personal devices at the workplace. However, you’ll need to have an upfront policy in place about the rules and regulations of devices on the company network. If users cannot or will not get their devices to comply with company standards, access should be limited or revoked from that device.
- Ensure that ground-zero for all devices is security. To guarantee that devices are safe, you need to make sure that they haven’t been unlocked; rules forbidding jail-breaking and rooting should be in place. Any user who violates this rule should be disconnected from the network immediately.
- Password protection to the tenth power. Require users to have long or complex passwords that change frequently.
- Create and configure a mobile device management policy. A good mobile management device policy contains app-shielding solutions that protect company data, as well as cloud-based gateways that prevent malicious content from reaching a device.
- Stay in control. It’s not enough to configure users and then leave them to their own devices (no pun intended). Once users’ mobile devices have been granted access to the company network, maintaining security also means monitoring user activity. Use your network controls to keep watch, and deny access for any device that shows signs of suspicious activity.
- Stay informed. While you’ll no doubt have network security measures in place regarding rooting and jail-breaking, it’s important for you to stay on top of the latest trends in mobile security. For the time being, malware isn’t considered the greatest threat to mobile devices; however, the world of mobile technology changes faster than you can say “Blackberry,” so stay abreast of changes.
- Provide effective Experiential Hacker Awareness Training (EHAT) for your end users. A programme of practical user training compliments policy documents and lets a users experience the “pain” of simulated security breaches.
These are just a few ideas to consider when considering the best network security solutions for your organisation. To find out more about mobile security solutions, contact LAN2LAN today. We have years of experience helping companies conceive and implement network security solutions on an international level. Call us today on 0870 787 4001 or email email@example.com and learn more about what our award-winning team of experts can do for you.
Angela Nightingale January 23rd, 2014 17:12:48
wireless network solutions, wireless networking solutions, wireless networking seminar, BYOD, bring your own device, BYOD workshop, BYOD seminar, LAN2LAN, wireless, network solutions, mobile App management tools, enterprise networks, network access control, mobile device management, MDM, mobile application management, Microsoft Lync, 802.11ac wi-fiFollowing the success of the October “Hacker Awareness Workshop” the 2 and a half hour event, registration has opened for LAN2LAN’s Wireless Network Workshop titled ‘Is your Wi-Fi Ready for the Future’ taking place on the 12th February 2014 in Leatherhead, Surrey.
Designed from customer feedback, the half-day workshop agenda tackles the key wireless networking challenges faced by IT professionals. This interactive session is designed to engage debate, inform best practice and challenge misconceptions.
Bring Your Own Device (BYOD) features prominently on the agenda. It’s the single largest disruptive force in networking today and has created a host of challenges for the IT department. LAN2LAN’s workshop facilitators’ will reflect upon how control has become devolved to end users and the resultant change in IT philosophy as well as infrastructure.
The days are gone when IT was the gatekeeper of everything enterprise and it ruled the network with a combination of strict policies, purpose-built technologies, and a fully contained technology ecosystem. Employees had to get IT approval to use an unauthorised device, even if it was useful and increased productivity.
The genie is now so far out of the bottle. Today, billions of Wi-Fi enabled smart phones and tablets are pouring onto enterprise networks. Each user is armed with more than three mobile devices and each mobile device is loaded with over 40 apps. According to ABI Research, over 9 billion Wi-Fi enabled devices have shipped since 2009, and Gartner predicts mobile app downloads will hit 310 billion by 2016.
Consequently, IT is struggling to stay in control. Users have far more latitude – freely connecting their own smart phones and tablets to the corporate network, downloading their own apps, and co-mingling work and personal information.
Redefining the IT mission will be another topic of debate the LAN2LAN workshop. It’s clear that BYOD has redefined IT’s mission and extended the boundaries of IT operations beyond the infrastructure to mobile devices and apps. The new IT mission demands a reliable mobile work experience for users without sacrificing privacy, security and control.
However, some big challenges remain for the department. How does IT maintain visibility and control of new devices that connect? What devices are being used, how many, and can IT support all the operating systems? What apps are users downloading over the enterprise network?
LAN2LAN’s Wireless Workshop will present industry best practice and client case studies of how other organisations are addressing these issues. As well as explaining how emerging standards like 802.11ac allow organisations to embrace Mobile Unified Communications, Microsoft Lync and Location Based Services.
“Big brother is dead but the buck still stops with us” is phrase that may be heard during the 2 and a half hour Wireless Workshop. Until now, IT has safeguarded company data by taking control over the entire device. But end users have rejected this big-brother approach to device security. What IT really needs is multiple approaches that address the entire spectrum of BYOD and its use cases.
As a result, a litany of siloed point-products have made their way onto enterprise networks to narrowly address some specific aspects of BYOD – network access control, mobile device management, mobile application management, guest management, and content management.
Unfortunately, stringing together a multitude of loosely integrated point-products can lead to more complexity, higher costs and compromised security controls. This approach also fails to streamline and automate time-consuming on-boarding tasks.
LAN2LAN’s Wireless Workshop will take a holist approach to the challenges of the modern network;
• The building blocks of a Mobile Business
• The evolution of wireless standards
• A practical approach to BYOD
• Emerging wireless location based services
• The new generation of mobile employees
Don’t lose the opportunity to engage with your peers at this industry leading Wireless Network Solutions event. It’s available as a morning or afternoon session on Wednesday 12th February to suit all diaries. Simply click here to register your interest; http://www.lan2lan.com/www/news_20140212_wirelessworkshop.html
Angela Nightingale January 20th, 2014 09:28:16
A new JVM will be pushed out by Oracle on Sunday, 19 January 2014. After this new JVM is pushed out, IBM Domino web applications using applets for actionbar.jar, editor.jar, nvapplet.jar, and outline.jar will no longer work in browsers running that latest JVM.
There are new .zip files from IBM containing re-signed Java applets for IBM Domino 8 and 9 that can be installed to overcome this problem.
Contact us at LAN2LAN if you would like our help with this upgrade or any other IBM Notes or IBM Domino related support issues.
Steve Lapthorn January 19th, 2014 14:30:13
As we recover from the Christmas rush, there’s always the excitement of ringing in a new year. Resolutions will be made. Goals will be set. And there’s plenty of work ahead in for all of us, especially IT professionals. For those of you who want to hit the ground running come January, we’ve put together a list of the Top Corporate IT Considerations for 2014.
Mobile devices and BYOD. We are living in a wireless world in the era of a mobile workforce. The Bring Your Own Device trend has been picking up steam over the last year, and with good reason: according to Dell, when employees are allowed to conduct work from their personal devices, productivity increases nearly 240 hours per worker. Because employers and employees alike are embracing the BYOD trend, IT professionals need to be ready to configure and manage users across multiple mobile devices, from phones and laptops to tablets.
- How to start prepping: Decide which employees would benefit most from the BYOD, determine which kind of access different employees should have, and plan to have a policy in place about which devices are acceptable and which are not.
Cloud Computing and the Personal Cloud. If your company joins the BYOD bandwagon, a cloud-based management system may be in order. Because employees are going to be accessing corporate data from laptops and tablets (among other devices), the simplest solution may be to implement a personal cloud in which each employee has access to his own personal data storage.
- How to start prepping: Begin mapping ideas around which employees could access the same cloud data for remote access. Focus on the amount of storage needed as well as best practices for access management. And don’t forget that it’s never too soon to start researching cloud vendors.
Security. With so many companies going mobile and migrating services to the cloud, security is going to be a hot topic for IT professionals in 2014. Corporate security demands are going to be two-fold in the new year: not only will IT staff need to implement security standards for mobile devices and network access, but they’ll also need to consider the security of the cloud vendor as well.
- How to start prepping: Begin by determining the different levels of access to be granted to each employee, and come up with a list of approved devices. IT staff will also need to conceive and implement a security policy regarding mobile devices; if any device isn’t brought into compliance with corporate regulations, it shouldn’t be allowed access to the network. Also work on questions to ask your cloud vendor, including but not limited to: Where is the data stored? What physical and technical security measures are in place? What are your backup and recovery methods?
When you’ve completed your security policy, have prospective vendors go over it and tell you how to improve it.
Access Management. The ability to access company data from any location and any device may be an employee’s dream. However, it can sound like a nightmare to an IT professional managing wireless network solutions. Don’t worry – finding a proper access management plan is not as daunting as it may seem, especially if you’re working with the right solutions provider.
- How to start prepping. Always begin by working with the senior management team to really understand what the company hopes to achieve with mobile access. When you’ve got a clear idea of the corporate vision for the future, work to identify the technical requirements needed to meet the company’s goals. (In most cases, you’ll need to evaluate what’s already in place to see if it needs to be reworked or re-imagined). Once you’ve got the technology in place, you’ll need to determine who gets access, followed by teaching those employees about company security and access policies.
At LAN2LAN, we’re thrilled at the prospect of helping you tackle the technical challenges headed your way in 2014. We’ll be your partners in helping you develop the best wireless network solutions for your company, and we’ll be with you every step of the way. Contact us today on 0870 787 4001 or email firstname.lastname@example.org to find out how we can help you take your company mobile.
Angela Nightingale January 14th, 2014 16:18:27
Attendees of LAN2LANs recent Hacker Awareness Seminar were left gasping as they saw mobile devices hacked and VOIP networks incapacitated. Danny Williams, LAN2LAN’s Security and Mobility Business Manager, said, "We created the 'Hacker Awareness Seminar' to demonstrate the mindset, methodology and motivation of a Hacker. We thought the demo’s would leave a lasting impression and we were right".
LAN2LAN invited leading industry figures Peter Cox of UM Labs and Michael Shaulov of Lacoon Mobile Security, to join their own Lee Duke to provide a master class. Each expert gave a practical demonstration on how to identify a security weakness, penetrate it and exploit it.
Peter Cox, showed how to penetrate a VOIP system, making phones ring at will to incapacitate the system. Mobile security expert, Michael Shaulov, socially engineered an App and applied it to a phone to control its sensory functions. The subsequent voice recordings and pictures taken during the seminar left the delegates speechless.
LAN2LAN Technical Security Consultant, Lee Duke showed how penetration works in practice by breaching network security and exploiting user administration rights. Danny Williams, pre-ceded the events by presenting a fictional business case showing how the data could be used. Delegates were enlightened into the world of identity theft, how the data is brokered and the financial rewards.
According to Williams "A thousand customer records can be worth as much as £600 to a Hacker so you don’t have to be a large organisation to attract their attention. Often small firms are more attractive as they don't perceive their data to be as valuable. Many don't realise they’ve been compromised by Malware so the Hacker can derive a steady income".
Another, security loophole is on VOIP, as executives tend to believe it’s bounded by IT network security. However, it’s rarely subject to your normal remote access security protocols. $42 billion of telephony fraud occurs annually as result. A common fraud is to redirect calls to premium rate line over a weekend. Often it is months before a company notices.
For many hackers, data theft is simply an easy way to derive an income. An industry has built up around it with tools for quality assessment of - and even web based dashboards for distribution of malware. However, client data is highly valuable with a street value higher than gold.
This would explain why, despite the millions spent on cyber security the frequency and severity of cyber attacks are on the increase. This could also explain the 75% attendance rate for the event. Additionally, according to Williams "The IT requirement is changing to one where end users have greater administrative responsibility for their own device and its applications. This presents a significant challenge to the IT security function both in terms of security solutions but also in end user education".
Danny Williams elaborated, "Under IOS the person using the device is the 'administrator'. Traditionally, in the corporate environment device administration has been in the hands of the IT function. With the momentum moving to BYOD and mobility, the challenge for IT is to cede responsibility for admin and device management whilst maintaining overarching security controls. This involves a change in mindset for everyone."
The LAN2LAN seminar was aimed at Executives charged with the integrity of company data. Universally, attendees felt that more was required to address the ongoing security threats. One attendee commented "Nothing’s Safe!" and another felt it was "time to review my corporate security arrangements".
Others focused their feedback on the multi-channel (aka "complex") nature of threats and were motivated to broaden their outlook. 'It’s not just about the kit you already have installed, you have to look deeper than that.'
Mobility and voice emerged as an area requiring greater consideration, "Mobile & IP Telephony needs more awareness – MDM on its own may not be enough" commented one delegate.
Danny Williams conducted the day by explaining that "modern IT security solutions are about creating a framework, giving users device control then supporting them with training, end point security and user authentication".
"The last few percent of your security depends upon the end user". This is perhaps the greatest security challenge. For all of the investment in network security solutions, end users still don’t think before they click (on spurious emails or attachments from unknown companies). Williams believes the answer is Experiential Hacker Awareness Training (EHAT), "practical demonstrations, such as today’s, are far more powerful than policies or procedures in creating end user awareness. Seeing the phone in your hand being controlled or hearing every phone in the building ring simultaneously is a chilling reminder to take security responsibilities seriously".
Overall the "Hacker Awareness Seminar" was well received. LAN2LAN’s next seminar on the topic of "Is your Wi-Fi Future Ready?2 it’s planned for spring. However, demand is such for "Hacker Awareness"’ that LAN2LAN are now providing Experiential Hacker Awareness training (EHAT) workshops as a consultancy service for individual companies.
LAN2LAN believe that in the future will only be two types of companies, "Those that have been hacked and those that don’t know they’ve been hacked".
Angela Nightingale January 7th, 2014 08:28:09