TMC's Advisor

Covering IT and Telecom from a Canadian Viewpoint

February 2015, Volume 2 Issue 2

It's All About People Issue

Just When You Thought You Were Safe - The Dangers of BYOD

By Peter Aggus

There are many advantages to allowing employees to connect their own devices to corporate networks. Employees like the convenience and itís an increasingly popular way of saving money on hardware purchase. Of course, Bring Your Own Device is not all positive. Hereís a summary of the risks.

Read More

Inside

People Want To Listen When... By Thomi Glover
Last month, Ellen described her surprise at the results of her Personal Styles Inventory. It was fun to help her learn how to increase her credibility with others.† Since our Ďstyleí naturally attracts some people and drives others away, itís important to learn to work well with anyone. Happily, this can be learned.

Data @ Large: The Real World of Data, Privacy and Security By Ellen Koskinen-Dodgson
The 16th Annual Privacy & Security Conference was held this month at the Victoria Conference Centre. It was a great success with the primary message being that the world is scary, from a privacy and e-security point of view and it"s getting scarier. From the introduction of Arpanet a scant 45 years ago to the internet that we know Ė things are much worse than I thought.

The People Side of BYOD By Ellen Koskinen-Dodgson
Most employees donít like corporate BYOD policies. They love the idea of BYOD but they resent the restrictions that come with it. Resentful employees cause major security risks but so do the everyday employees who are too trusting, who think that the sky will never fall. Here are some ways to improve employee behaviour.

Penetration Testing

Attacks are everywhere and attacker sophistication is constantly increasing. Verison's survey reported 63,000 security incidents and 1400 data breaches in 50 global companies.

The top three most common data breach techniques are:

  • web app attacks
  • cyber espionage
  • POS Instrusions

TMC can perform an external penetration test of your network as well as a scan of your customer-facing web applications using a specialized security assessment application.

  Copyright ©2020 TMC IT and Telecom Consulting Inc. ISSN 2369-663X