by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : August 2014
39 CDWG.com | 800.808.4239 and tablets, organizations need a full-featured MDM solution to secure mobile applications and devices. Many solutions include their own form of sandboxing to add heightened security for organizational information stored on personal devices. For desktop PCs, next- generation firewalls can regulate web traffic and provide a barrier against known malware and infected sites. An advanced security option specifically for endpoint protection is MacAfee Deep Defender. MacAfee worked with Intel to create a solution that resides between the memory and the operating system to perform real-time memory and CPU monitoring. Deep Defender guards With data breaches and system break-ins making the headlines daily, IT staff has recognized that absolute security will always remain a theoretical concept. Add in the broad diversity of wireless networks and user-owned smartphones and tablets, and security challenges multiply. Establishing an overall security policy is, of course, a prerequisite, but organizations can take additional steps toward minimizing risk. Phil Hochmuth, security products program manager for IDC, offers IT managers these mobile security tips: 1 | Use what you've got. ink about the mobile extensions to existing products or the mobile option to traditional products, such as those from McAfee, Symantec and Trend Micro. 2 | Prioritize different types of users for BYOD. Assess the bring-your-own-device requirements for certain kinds of tasks. For example, in an organization, it makes sense for knowledge workers to have BYOD privileges. In a school or college, most teachers and professors would require BYOD. 3 | Focus on the data. Ultimately, it's the data that IT managers are concerned about. Take a data-centric approach to mobile security by, for example, installing data loss prevention tools. Even security-savvy end users may fall victim to social engineering exploits, for example by opening email attachments that appear to come from a trusted source. e growing sophistication of APT practitioners is only one reason that social engineering remains effective. Attackers can access more information than ever before to create targeted attacks. e rise of social networking has allowed hackers to easily find information about users, such as their personal interests, which makes it easier to profile and attack them, security experts say. Ongoing and detailed training about the latest exploits and security best practices will ensure that workers keep up their guard and reduce the chances that they'll fall prey to attacks. 3 TIPS FOR MOBILE SECURITY NO TRAIN, NO GAIN essential system software residing in physical memory. It can block advanced stealth behaviors used by rootkits and APTs and defend against zero-day attacks. Safer Is Better Even the best security policies and technologies won't make organizations entirely safe from sophisticated APT exploits. But by mitigating known threats and focusing security resources on high-value targets, organizations can at least become safer, which is always a better place to be in an unsafe world.