Archive for June, 2017

BlackBerry Enables The Enterprise of Things To Thrive With Enhanced Mobile-Security Platform

Posted in Commentary with tags on June 20, 2017 by itnerd
With an estimated 20.8 billion connected devices by 2020, the Internet of Things (IoT) is transforming how we live, and the Enterprise of Things is transforming how we work. As such, BlackBerry today announced productivity and security enhancements to its enterprise software platform designed to power the Enterprise of Things.

As part of BlackBerry Secure, the most secure and comprehensive platform to connect people, devices, processes and systems, BlackBerry Enterprise Mobility Suite provides secure, management policies and controls across key platforms (iOS, Android, Windows 10, macOS, and Samsung Knox) and device ownership models such as BYOD and Corporate Owned. It can be delivered on premises, as a cloud service, and now includes the following features to improve productivity and security:

 

  • Manage and Secure Microsoft Office 365 Mobile Applications: IT can manage and apply protection policies to Microsoft Office 365 mobile applications such as Word, Excel, and PowerPoint from BlackBerry UEM.
  • Access Business Data on Unmanaged Laptops: Users of BlackBerry Access, will now be able to securely work with business data on their personal or BYOL (Bring-Your-Own-Laptop) Windows 10 and MacOS computers.
  • Provide In-line Comments, @Mentions and DocuSign: BlackBerry’s secure Enterprise File Synchronization and Sharing (EFSS) solution, BlackBerry Workspaces, has been updated to allow in-line comments, @mentions and alerts. DocuSign has also been integrated, adding a key workflow for legally binding documents such as loan applications and financial transactions.
  • Leverage Application Analytics: BlackBerry Analytics can now track daily and monthly active users, daily minutes used, usage by OS type and version, daily launch count and user engagement by feature (such as 1:1 chat vs group chat). This application analytics capability gives IT and developers the keyinsight they need to increase business productivity, such as modifying UX flow, modifying training or altering maintenance schedules.
  • Manage More Wearables: BlackBerry has extended its endpoint management software capabilities to include modern workforce devices such as smart glasses. Applications specific to wearables, such as Ubimax and Atheer, can also be securely managed.
The company’s industry-leading security is trusted by organizations in government, defense, intelligence and other environments with the most stringent security requirements. In addition to more than 80 security certifications, BlackBerry was once again named a Leader in Gartner’s June 2017 Magic Quadrant for Enterprise Mobility Management Suites. This year, the company moved higher in execution and farther in vision and was one of four EMM vendors to be positioned in the Leaders’ Quadrant. BlackBerry also received the highest score in all six use cases of Gartner’s August 2016 “Critical Capabilities for High-Security Mobility Management” report.
For more information on BlackBerry’s platform and core capabilities available today, please visit: www.blackberry.com/enterpriseupdate

Guest Post: Xerox Discusses four steps to help your small or medium-sized business go digital by cutting your ties to paper

Posted in Commentary with tags on June 20, 2017 by itnerd

Has your organization started its paper-to-digital transformation yet? If you haven’t, you’re not alone. Many organizations have put this off because they just don’t know where to start. The whole idea of digital business is overwhelming – but urgent.

When processes are paper-based, employees can’t easily access information or share it across groups, especially when teams are distributed or mobile. Paper puts barriers between people and their work processes, and between different functions within the organization, resulting in dreaded “silos.”

More than 80 percent of small/mid-size businesses (SMBs) want to cut paper out of the way they invoice, report financials, manage legal and human resource forms, and handle other time consuming processes, according to a recent Xerox survey.

The survey of more than 1,000 international SMB companies shows respondents expect to make the change during the next 12 months. Nearly half (46 percent) of respondents confirmed that a significant amount of time is wasted on paper-intensive processes and 6 out of 10 view this as having a major impact on their bottom line.

So what’s the problem? Research continually confirms that one of the main roadblocks to digital transformation (DT) is deciding which processes to transform. The vast number of processes in a typical business makes the whole notion of becoming a digitally enabled organization unnerving.

That’s why Xerox Canada has created a new paper-to-digital workbook detailing a four-step approach to help organizations reduce paper in their processes.

 

Step 1 — Understand

Establish how and where you use paper today, and identify what you could change.

The distinction between “good” and “bad” paper helps identify where you really need to use paper, and where you could get rid of it.

“Good” paper refers to documents that have a valid reason to be in hard-copy form, such as documents that originate on paper, like customers’ handwritten letters or documents that require a “wet ink” signature.

“Bad” paper refers to documents that are in paper format, but without any compelling reason to be so. These could include documents that were printed from digital originals or documents that get shared, stored or transported using physical systems.

 

Step 2 — Educate

Set targets, make your case and change user behaviors.

Before you can make improvements, you need to decide what “good” looks like. That means determining policies, setting targets and defining metrics – at the organizational and team levels and for individuals, too.

Targets at the individual level can help people understand what they have to do to make change happen. However, it’s vital to respect the role of printing in people’s daily activities – balance is key in achieving your overall objectives. The last thing you want is to drive users to costly workarounds, such as printing at home or using offsite service providers.

The best way to encourage behavior change is to give people ownership and control. If they know the targets they’re working toward, and how to achieve them, you’re already halfway to success.

 

Step 3 — Execute

Replace key functions and processes with digital equivalents.

Execution will only succeed if everyone within the affected group is on board. Unless your change is very minor or localized in scope, this will be a big job – it’s important to take it seriously. As a first step, list the teams, managers and individuals who will be affected by the planned change, and determine how each one will be affected. How will their work change? What will they need to do differently from day to day?

Now, for each team or person, consider which benefits of change are most significant, or most directly relevant to their work. How can you express each benefit so they can easily understand and relate to it?

Some processes are simply too large or complicated to be changed quickly. If changing everything in one go would be risky, consider targeting just one stage of a process first. Then, once that stage has been transformed, move on to the others. It may be slower, but if it avoids the risk of business disruption or data loss, that’s probably a wait worth having.

 

Step 4 — Improve

Use data and information to take your transformation to the next level.

Once you’ve successfully switched some of your tasks and processes from paper to digital, you can explore the potential for more wide-ranging change projects to automate and simplify key business workflows.

Many ideas for further improvement can come from data on how paper and printing are being used within your organization. Managed Print Services (MPS) generate data that can show you how much you’re printing and the cost. User analytics go a level deeper, showing you who is printing what and when. That can open up opportunities to tighten up security, increase automation and spread printing best practices, or simply monitor print usage to make sure your previous changes are taking root.

Of the SMBs surveyed in Xerox’s recent study, 42 percent have an MPS contract, while 40 percent said they plan to put an MPS contract in place within the next year. Sixty-six percent spend more than $1,000 each month for printing activities, a significant cost of doing business. Companies with MPS contracts cited reduced costs, decreased paper consumption and improved tracking of print costs as top benefits.

MPS can act as a springboard to help your organization shed its reliance on paper. The chances of digital transformation success are greater when you engage MPS, because you can start with the day-to-day document processes that touch your device endpoints. This approach makes it easier to break digitization into bite-sized chunks and implement solutions based on data. A measured pace of change lets you transform at a manageable rate. And once you start, you’ll never go back.

You can download a copy of Xerox’s print-to-digital workbook at https://www.xerox.com/en-us/managed-print-services/insights/advantages

FCA Canada Now Allows You To Buy A Car Online

Posted in Commentary with tags on June 20, 2017 by itnerd

FCA Canada has announced that they now provide a multi-faceted, online retailing solution that makes it easier for consumers to begin a vehicle purchase digitally.

The new digital retailing solution was developed collaboratively between FCA Canada and Dealertrack Canada and includes innovative dealer website enhancements that deliver a more efficient, secure and transparent on-line process for vehicle purchases. This marks the first time that Dealertrack Canada has partnered with an OEM since revealing its digital retailing technology to the Canadian market earlier in January. The enhanced websites will be offered by participating dealers.

Initially, the enhancements will include the ability to pre-qualify and apply for financing on both new and used vehicles, plus an enhanced payment estimator for an actual vehicle in-inventory. FCA is working to offer additional features such as a trade-in estimator, as well as the ability to reserve a vehicle with a deposit and purchase service packages.

This will significantly reduce the time involved with the purchase of a vehicle and will actually initiate a formal purchase agreement. Customers will still need to complete the final purchase transaction at a local dealership.

 

MedChart Gives Patients Instant Access To Their Medical Histories

Posted in Commentary with tags on June 19, 2017 by itnerd

MedChart consolidates medical records into a secure, accessible online platform. Patients provide consent and basic personal information that allows MedChart to collect their medical records, which are then converted from paper, film, digital and other forms into searchable electronic records. The cloud-based MedChart portal can be accessed anywhere on any device.

For patients, especially those with a history of multiple illnesses, it’s easy to get discouraged by the number of consultants and specialists they encounter over the years, conflicting diagnoses, miscommunication and a general sense of helplessness. With MedChart, patients can avoid problems by spotting and quickly fixing errors, duplicate tests, and under or over medication. More importantly, they have the peace of mind that the right information is being shared with the people who need it in order to treat them better.

The portal uses industry-leading encryption technologies used by healthcare providers. Records such as past illnesses, procedures, medication, exams, and diagnostic tests can be stored and made available to healthcare providers, insurers, legal representatives, family and other designees worldwide.

In case of emergency, a wallet-friendly MedCard allows critical records such as medications and allergies to be accessed by doctors, family or other caregivers on any device.

MedChart is currently available to the public in Ontario, British Columbia, Alberta, Saskatchewan and New Brunswick. The company plans to roll out to the rest of Canada in the coming months. It raised startup funding from the Ontario Centres of Excellence and Hero Ventures, and received awards from the University of Toronto Start@UTIAS and Entrepreneurship Hatchery accelerator programs.

Guest Post: Systems Under Threat – Why the Cloud is your Best Defense

Posted in Commentary with tags on June 19, 2017 by itnerd

By: Jarrod Levitan – Chief Cloud Officer at TriNimbus and AWS Community Hero

I just got back from a government technology summit in Washington DC. It was hosted by Amazon Web Services (AWS), the leader in the Cloud technology space. I was speaking to someone from the CIA (who will remain anonymous) who was responsible for implementing the outcome of the deal between AWS and the CIA for $600M. The one where IBM attempted to sue the US Government for selecting AWS and lost. The public only knows about this because IBM decided to sue AWS.

As with all things new, there comes a reckoning. It was IBM’s turn to recognize that they had been clearly beaten by a provider that was far superior to their offering. And obviously for the CIA, far more secure.

That was in 2013. In the past 4 years, AWS has vastly accelerated their security offerings.

We all agree that there are bad guys out there. Super smart cyber hackers ready to push the boundaries and hold your company’s data for ransom, just ask Hillary Clinton. If you’re in charge of security, you have decisions to make every day to keep the bad guys out. Would you rather have an army of the best security engineers in the world at your defence, or the three guys you have working on your team? The answer is pretty obvious.

The Cloud is that army of security engineers. Your own aircraft carrier of world leading analysts, tools and specialists at your protection.

Let’s be clear, there would be no cloud without extremely robust security. Forget the CIA, no one would trust it. Instead we have large government entities from around the world, not to mention the largest corporations like GE and Johnson & Johnson accelerating their adoption of Cloud and going all-in.

This is why AWS calls security ‘job zero’.

So what is AWS doing about security that’s not available in your own data centre or rented facilities (co-locations)? Why is the Cloud more secure?

Let’s start with the long list of compliance standards that AWS attest to. Not to bore you with details but it includes things like protecting credit card data with PCI, or personal health information with HIPAA, SOC for financial information, plus defence and government standards like ITAR and FedRAMP. Anyone who has worked with these Standards understands they are no walk in the park but they are hard requirements in a variety of industries. They involve many items including physical security, access to logs, networking security, procedures and much more, which are controls that are frequently proven with ongoing audits. Achieving this high level of security and compliance standard is prohibitive but to only the largest organisations in the world. You automatically get your environment with all these standards once you sign up for an AWS account.

The biggest vulnerability in security is people. Because we do things manually, miss things and make mistakes. If we can reduce or eliminate people from the heavy lifting, then we could increase our protection. Instead of people in the Cloud, we use software, and the reckoning here is that the Cloud is driven by software or better defined as Infrastructure-as-Code. What’s powerful about code is you can version it, control it, and understand who wrote it or changed it. It automates your environments and specifically all your security controls. You can enforce policies and remove bad actors. You can control your network, server, storage and all services in AWS with code and thus security is baked into every AWS service. A great example of this is the AWS service called CloudTrail which logs most services on AWS ensuring you know exactly what goes on in your environment, and can be turned on with a single click, or better yet, one line of code. Some other tools are the Web Application Firewall (WAF), which defends against common web exploits, the Amazon Inspector which continually assesses your systems for security flaws and AWS Shield, which automatically protects you from Distributed Denial of Service (DDoS) Attacks, which is unfortunately common these days.

Among the other big vulnerabilities are operating systems like Windows and Linux which billions of our systems depend on. The latest WannaCry episode was unfortunately a great example where the bad guys hunted out any unpatched Windows Operating Systems. In the Cloud these systems can be automatically patched and you would have completely avoided this vulnerability. It would have secured you… automatically.

If security is important to you and you plan to grow or use technology in your organisation, the cloud enables you to be secure and grow fast. Until now these were contradictory terms. How can you grow fast when you have security team members on your back who want less change and more status quo (no offence security folks, we understand you’re doing your job). That’s where you combine the cloud security posture with software and automation and move fast because security is baked into everything you do. Security people are happy.

Okay, this all sounds too good to be true, right? Well you can definitely have your security cake and eat it, however, there is a lot of responsibility you must bear when you architect and deploy your systems on AWS. There is a shared responsibility model to incorporate. AWS only protects what’s in AWS, everything from the hypervisor and below. Above the Hypervisor it’s your job to protect that, and protect your data. You have a universe of advanced tools inside AWS to do this and it can all be automated with code.

If you’re thinking about Cloud, and still learning, or looking for an organisation who really understands cloud, we advise you get some help from professional consultants like TriNimbus on AWS (it was time for a personal plug) to advise you on best practices and get your tenancy secured on AWS.

 

 

Infographic: Netatmo Tips On How to Better Protect Your Home While On Holidays

Posted in Commentary with tags on June 19, 2017 by itnerd

Security_Tips_ENG Canada.jpg

Source: Netatmo

DREAM DADDY: A Dad Dating Simulator

Posted in Commentary with tags on June 18, 2017 by itnerd

The role of a single father is one that is seldom discussed in pop culture, let alone the dating struggles of a Dad whose life is devoted to their child. Upcoming video game DREAM DADDY: A DAD DATING SIMULATOR (DDaDDS) strives to create a dialogue about fatherhood, romance, and just what it means to care for someone. Created by Vernon Shaw (of Game Grumps and Hot Pepper Gaming fame) writer/illustrator Leighton Gray, and the Game Grumps, DDaDDS follows the dating journey of a customizable single father as their daughter prepares to go off to college. With a variety of fellow available (and not so available!) dads to choose from for romantic perusals, DDaDDS tackles the challenges of dating as a single dad with humor and a genuine, heartwarming message weaved throughout the entirety of the game.

DREAM DADDY: A DAD DATING SIMULATOR releases on July 13th via Steam. Here’s a look at the trailer:

UPDATE: Here’s a Canadian connection. Canadian Pop Punk band “PUP” will have a featured track and cameo in the upcoming video game “Dream Daddy: A Dad Dating Simulator”. The song – “DVP” – will play while you are on a date with one of the dad love interests in the game. PUP also makes an appearance in the game in more than just music – they have also been illustrated into the game itself.

PUP the band.jpg

Infographic: Home Invasion In Canada

Posted in Commentary with tags on June 16, 2017 by itnerd

Security Stats Infographic_ENG Canada.jpg

Guest Post: Column Information Security Discusses The Top Application Security Threats & How To Counter Them

Posted in Commentary with tags on June 16, 2017 by itnerd

Application Security is the use of software, hardware, and procedural methods to protect applications from external threats. In the world of software design, security is becoming an increasingly important concern during development as applications are more accessible over different networks and as a result, are more vulnerable to a wide variety of threats. Many applications are fundamentally flawed, making it possible for hackers to steal data, hijack user inputs, or deny service entirely. The following slideshow presented by Column Information Security presents an application checklist—a look at how your company can counter the impact of seven top application security threats.

You can view the slideshow below.


Top Application Security Threats slideshow was created by Column Information Security

Author Bio:

Nori De Jesus is the Global Director of Marketing at Column Information Security. Nori brings over 20 years of experience as an advent marketer and business strategist working with software manufacturers and launching proprietary software solutions into the market.

CENTRI Showcases Chip to Cloud IoT Security Solution at Connected+ Toronto 2017

Posted in Commentary with tags on June 15, 2017 by itnerd

CENTRI, a provider of advanced security for the Internet of Things, today announced their diamond sponsorship of Connected+ Toronto 2017 Conference, June 20-21, at the Metro Toronto Convention Centre, Toronto, ON.

Located in booth #717, CENTRI will exhibit their Internet of Things Advanced Security – IoTAS platform to deliver device integrity, data protection and optimization in all states and data intelligence for administrators. IoTAS makes it simple for developers to add a more complete IoT security solution into their own products and services with both flexibility and intelligence. The small 50kB software-only footprint of the platform enables thing makers of all device types and sizes to get to market quickly and more securely versus risk intensive do-it-yourself (DIY) projects. Demonstrations in the CENTRI booth will include IoTAS secure communications and data protection at rest for different IoT industry use cases.

CENTRI Technology executives will lead IoT security discussions in three separate presentations:

Keynote Speech: Why DIY is DOA for IoT Security
Presenter: Grant Asplund, Vice President of Sales and Business Development
When: Tuesday, June 20, 2017:  1:30 p.m. – 2:00 p.m. Eastern Time
Where: Main Stage

Breakout Session: Makeup of an Ideal Secured IoT Device
Presenter: Mike Mackey, CTO and Vice President, Engineering
When: Tuesday, June 20, 2017:  10:45 a.m. – 11:15 a.m. Eastern Time
Where: Theatre 2

Demo Session: Internet of Things Advanced Security – IoTAS
Presenter: Riju Narayanan, Product Manager
When: Tuesday, June 20, 2017:  2:00 p.m. – 2:30 p.m. Eastern Time
Where: Solutions Lab

CENTRI is offering an unlimited trial of IoTAS for two concurrent users to qualified IoT developers at the conference to test the ease and simplicity of this advanced security solution. The trial version is easily upgraded to the commercial version so no prototyping work is lost. Use cases for IoTAS range from securing low-power medical and industrial devices, home automation appliances, connected cars to central command of field equipment with utilities.

For product demonstrations and more information on CENTRI’s leadership on IoT security, visit booth # 717 at the Metro Toronto Convention Centre and connect with the company on LinkedInFacebook and follow @CentriTech on Twitter.