The Manhattan Project

nycThe District Attorney for New York County and Manhattan is officially calling for smartphones to be equipped with a backdoor. Boing Boing reported last week that the DA’s efforts to ensure law enforcement access to stored data on all tablets and smartphones has the support of law enforcement officials in The UK and The Netherlands. So there’s that. But while the DA’s office goes to great lengths to affirm that access under search warrant would not violate human or civil rights, the report does not address the very real problem on the tech side. If you put a chink in the armor, it seems, wouldn’t you invite other, less hospitable elements to the party?

The Price of Tea in China

What in the world does this have to do with your little corner of paradise, you might be asking. You run a clean shop, take precautions, even revisit your network security protocols more often than required. You’re ahead of the game, but the rules have always included some sort of encryption, especially with the advent of smartphones and tablets. Maybe that’s the takeaway, that the rules will always be changing.

The Price of Security

ICS lives at the leading edge of change in network security, so we know the threats and the best methods of guarding against them. The first step, risk assessment, delivers both quantitative and qualitative measures of organizational risk, allowing you to optimize your security spend and efficiently allocate resources to maximize business value.

Call ICS to take that first step today, and tomorrow you’ll run an even tighter ship.