There are numerous stories in the press about companies who demand to see the Facebook profiles of job applicants or current employees. In some cases, employees have been denied employment, suspended or fired for refusing to provide this access.
By nature SMBs need the flexibility and productivity that personal devices now offer. But is the company at risk with the fast adoption of “consumer” BYOD practices? There was a time when cool gadgets and slick computers were only found in business e
The Bring Your Own Device (BYOD) trend is consuming lots of digital ink on blogs, IT managers are wrestling with the problems created by it, and a growing number of vendors are addressing the issue with innovative new solutions. But when we talk abou
The highly regulated financial services industry has been given another set of social media guidelines. Most well known might be FINRA’s (Financial Industry Regulatory Authority) two notices (published January 2010 and August 2011) to try to assist w
More and more today, for the corporate user, social networking is giving way to social business, and along with it, experts predict, will be specific social media law and regulations.
A recent eWeek article, IBM Gets Down to Social Business, points to
For heavily regulated industries, such as financial services, social media is an attractive communications tool, but it needs to be managed carefully. According to a social business survey conducted last year by IDC, 51 percent of companies use consu
We are about to publish an industry analysis report on corporate use of social media and have completed three large surveys as part of that effort: one on the business aspects of social, one focused on its IT implications, and another with end users.
Over the past several years, one of the most important trends to impact organizations of all sizes—but particularly mid-sized and large organizations—is for employees to use their own smartphones and tablets in the course of their work. The so-calle
No matter the size of the business (large or SMB), for anyone in financial services, compliance is a major concern for this heavily regulated industry. Interestingly, as compliance concerns go, other industries often look to financial services to ado
One of the most talked about trends in messaging today is BYOD (Bring Your Own Device), which began about the time iPhone mania really took hold. After 2007, when third-party developers were encouraged to develop apps for the iPhone, users started to
I spent some time at Black Hat this week and was both impressed and scared by the tenor of the discussions around security—or the lack of it—in our national infrastructure, our computer systems, and even our smartphones. For example,Trustwave SpiderL
A loose coalition of Internet companies, advocacy groups and individuals that helped defeat SOPA/PIPA have launched the Internet Defense League(IDL). The group is looking to enlist millions of people around a shared set of values, namely “defending a
Brands used to bully owners of domain names that the brands did not like, without any real legal basis. A new reverse domain name hijacking (“RDNH”) case may prevent this bullying from happening again and cause brands to think twice before initiating
Today there is an app for just about anything and everything. In recognition of this trend, this fall, the Federal Trade Commission (FTC) produced guidelines to assist developers of mobile apps to be in compliance. According to a the most recent edit
For most organizations, the largest single source of information about what’s going on in their business is the collection of user mailboxes and email archives distributed across the company. These data stores contain information about who communicat
One of the fundamental tasks for an information worker is creating and revising documents based on the feedback of multiple users. In my own case, I am frequently working on documents with multiple reviewers, such as white papers that are sent to sev
The concept of a “common carrier” is one that has been applied to transport companies for centuries—the first such case on record in English common law dates back to 1348—although in more recent times the concept has been applied to telephone compani
A woman’s boss overheard that she had purchased a new dress and decided to send her an email late at night telling her “I’m sure you’ll look amazing in it.” After a half-hearted apology for sending her the email, he then sent her an instant message t
The traditional model of deploying email, security, archiving, backup and related solutions using on-premise servers and software (or appliances) requires a certain amount of trust—trust in the technology offered by the hardware and software vendors,
In a new research report by Ira Winkler and Samantha Manke from Internet Security Advisors Group (ISAG), Fortune 500 information security officers discuss employee education challenges and share practical advice about how to improve employee awarenes
Please, subscribe to get an access.