Join other Information Security Professionals and Subscribe

to receive monthly insights on securely enabling business transformation

Bridgeway Insights

Welcome to Bridgeway's Blog - bringing you news, views and opinions on issues that matter to you.

The purpose of this blog is to help you in your job and offer a better understanding of security. If you have any thoughts on the content or you'd like us to cover something then please don't hesitate to tell us.

Posted by Lisa Higgins 24 October 2018

During this current decade we have gone from $37bn to over $96bn worth of annual information security spending, yet by whatever metric you want to use - the number of data breaches or the number of viruses for example - the picture is rather bleak. We’re spending more money but we’re getting more security breaches, so something isn’t working. The focus needs to shift; Mobile First or Cloud First is all well and good, but what about the user?

Continue reading...
Posted by Jason Holloway 4 August 2015

A look at how organisations can approach understanding the drivers and the processes involved in their mobility projects, and planning for how to ensure overall project success.

I recently gave a presentation at the Enterprise Mobility Management Conference in London, where I discussed the typical lifecycle of a mobility project and what ensures a project's success. Before embarking on a mobility project, I think it’s important for organisations to understand the processes involved in the project, and to consider what they want to obtain from it.

Continue reading...
Posted by Louisa Mackintosh 24 July 2015

During mobility projects, one of the issues that comes up time and time again is the total cost of ownership, or TCO. Mobility projects are long-term and there is a wide range of associated costs that organisations need to consider. So what are these costs and how can we maximise efficiency for long-term gain to the organisation?

During mobility projects, one of the issues that comes up time and time again is the total cost of ownership, or TCO. Mobility projects are long-term and there is a wide range of associated costs that organisations need to consider. So what are these costs and how can we maximise efficiency for long-term gain to the organisation?

Continue reading...
Posted by Louisa Mackintosh 8 June 2015

Bridgeway Security Solutions are delighted to announce that we are presenting a plenary session at the 4th Enterprise Mobility Management Conference next week. Jason Holloway, Bridgeway's Managing Director, will be presenting on 'Understanding The Mobility Project Lifecycle.'

Next Thursday, 18th June, Whitehall Media’s 4th Enterprise Mobility Management conference takes place in London, where leading figures from across the mobility industry will be sharing strategies and insights with senior business and technology professionals on how mobility can accelerate business growth and performance.

Continue reading...
Posted by Louisa Mackintosh 1 May 2015

A recent court ruling in Texas has raised some very interesting issues around enterprise mobility management (EMM) and BYOD. Saman Rajaee, who was working as a salesman for homebuilder Design Tech Homes, sued the company after they remotely wiped personal data from his iPhone shortly after he had handed in his notice. It is clear that no documented mobile IT policy was in place. The case was dismissed in federal court but is still pending at state court level.

recent court ruling in Texas has raised some very interesting issues around enterprise mobility management (EMM) and BYOD. Saman Rajaee, who was working as a salesman for homebuilder Design Tech Homes, sued the company after they remotely wiped personal data from his iPhone shortly after he had handed in his notice.  It is clear that no documented mobile IT policy was in place. The case was dismissed in federal court but is still pending at state court level.

Continue reading...
Posted by Jason Holloway 16 February 2015

Back in 2011, the Department of Health published a progress report from its National Mobile Health Worker Project, which was designed to examine the potential technical and business benefits of mobile working in community health services. It’s interesting to note that while the technology has evolved since then, the challenges of integrating mobile into the day-to-day running of the NHS remain consistent...

Back in 2011, the Department of Health published a progress report from its National Mobile Health Worker Project, which was designed to examine the potential technical and business benefits of mobile working in community health services.

Continue reading...
Posted by Jason Holloway 8 February 2015

Lack of consistent mobile Web access is hampering business activity - but what can be done about it?

These days, people expect decent internet access wherever they go, whether they’re on a train or at the pub. However, we’ve all experienced the frustration of not being able to log on when we’re out and about. The fact remains that the quality of mobile network coverage varies greatly across the UK.  Many parts of the country, mostly (but not exclusively) rural areas, suffer from poor or practically non-existent coverage, while the quality of mobile coverage on Britain’s road, rail and underground networks is failing to meet commuters’ expectations. As more and more business is conducted online and on the move, this lack of connectivity is hurting the UK economy.

Continue reading...
Tags
Mobility
Posted by Jason Holloway 8 December 2014

The first in a series of blogs that look at how businesses can change the way they manage their IT to accommodate the mobility wave.

Business IT is undergoing fundamental changes right now – changes that are as fundamental and far-reaching as when your company first connected to the Internet back in the 90s.  What’s more, these changes are probably not part of your existing IT strategy, but they’re happening all the same.

Continue reading...
Tags
Mobility
Posted by Jason Holloway 10 October 2014

This week, something happened which could sound the death knell for the use of memory sticks in business. The code for an unpatchable vulnerability which undermines the security of USB devices, and can turn any such device into a malicious agent, has now been published online. Is it time to finally say goodbye to the USB drive?

In 2009, I was working with a vendor of secure USB memory sticks.  The devices were intended to mitigate the risks of data losses by automatically encrypting data copied onto them.  At that time, data breaches by public and private sector organisations resulting from lost USB drives and laptops were regularly in the headlines, so a memory stick with onboard encryption was a simple, effective solution to a common problem.

Continue reading...

 

 

Most Popular Articles