Wavelink Blog

Tag: Security

Is Data More Expensive in the US?

According to the Ponemon Institute, data breaches cost US companies much more than their European counterparts. This brief highlights much of the findings and also raises some interesting questions about the effect federal regulations have on that cost.

Check it out and tell us how you feel about federal regulations and their potential effects on the total cost of a data breach.

The Sopranos and Wireless Security?

I came across this little tidbit from Computerworld regarding the FBI’s Top 10 posts in cyber criminal operations. I have to admit, that while aware of the security risks presently facing companies, it seems that every other day more information is presented that makes me think “These people will stop at nothing.” But, that’s exactly the point.

It’s a completely accurate assessment and when you read reports like this, it becomes even more apparent. It’s probably safe to assume that when cyber criminal rings start delegating specific jobs/positions as most legit organizations do, they aren’t just going to back down when they see opportunities that might take a few more resources to compromise than usual.

My mind keeps racing to a smokey backroom, reminiscent of something out of the Sopranos, but instead of a pool table and stacks of stolen merchandise, we see a complex set-up of computers, servers and hackers searching for their next cyber targets. Now, to my best knowledge, I know of no HBO pilot in the works about a ring of cyber thugs who prey on poorly secured wireless networks and mobile devices, but it is nonetheless some scary stuff. Just another reminder that you can never be too tight with your security policies, I guess.

What can Tiger Woods Teach Us About Security?

Came across this Blog article discussing what we can learn about mobile device security from Tiger Woods. While the piece is largely geared towards mobile phone devices (and not ruggedized handheld mobile devices), its principles are the same and the context which the author presents the material is, at the least, going to get a smile or two.

Wi-Fi – Ruggedized versus Consumer Grade – Part II

Yesterday we talked about some of the basic differences between a consumer grade Wi-Fi device and one made for the AIDC industry (the ruggedized version).  Now let’s dig into some more detail.

Vendors of AIDC equipment know that having an industrial grade supplicant is key.  So the supplicants they pre-load are built to deal with harsh Wi-Fi environments and the extremes of competing with large numbers of other third party networks.

Supplicants supplied by all the major AIDC vendors handle the example cited in yesterday’s blog posting about our Seattle office with ease.  And these supplicants go further…


More figures on mobile security

Lots of information lately on the growth of the mobile device security marketplace. The latest from ABI Research focuses on the increasing levels and sensitivity of data being stored on smartphones, but it’s not hard to draw the same conclusion for any mobile device, whether it’s a smartphone, or mobile computer.

How serious are enterprises about wireless device security?

Wireless Analytics offers up some pretty intriguing statistics on wireless device security. If the study they reference is correct, the percentage of enterprises taking the right steps to secure their wireless devices versus those who state it as a priority, and don’t take action, is pretty drastic.