The Information Commissioner’s Office (ICO) for the United Kingdom recently issued its annual report on fines given to companies that failed to protect consumer data, and a surprising number of those fines were given out for data that involved data loss traced to multi-function devices (MFDs) such as copiers and scanners or multi-function printers (MFPs), including printed records and faxes.Read More
As any IT professional can attest, the main challenge with BYOD can be summed up in a single sentence. “IT does not control the content and configuration of the device.”
Since the mobile devices belong to individual employees, IT policies calling for the company to view or wipe personal data are problematic. So most enterprise mobility management or mobile device management tools piggy-back on top of the user’s personal data, so that it can be removed when the device is no longer used for work.Read More
It’s hardly news to CIOs and other IT professionals that smartphones are an integral part of everyday life for most working adults. But it was still a bit of a shock when Yahoo CEO Marissa Mayer stood up at the 2014 World Economic Forum in Davos to cite research that the average person now checks their smartphone a staggering 150 times a day.
Shortly thereafter, Salesforce CEO Marc Benioff showed the FitBit device he said had helped him lose 30 pounds, and noted that “I lost 30 pounds wearing the Fitbit; I do 10,000 steps a day. But here’s the amazing thing: Last week I got a call from Michael Dell. He asked if I’m feeling okay. ‘Why?’ I asked him. ‘I’m worried about you,’ he said, ‘because I’m your friend on the Fitbit network and noticed you hadn’t worked out in the last 3 days and wanted to make sure you’re okay,’ said Benioff.Read More
Once upon a time, the goal of IT security professionals was to create an impenetrable security wall to protect company assets from outside thieves and hackers. IT World Canada says that’s an outdated idea, and CIOs in 2015 have given it up in favor of more achievable goals.
The article by Nestor Arellano says that mobile device headaches have changed cyber security forever, and that connected devices of all kinds have created a third platform that forces CIO’s to shift their focus towards risk assessment rather than the “outdated perception” of creating an impenetrable wall around the corporate network.Read More
According to the Darkreading security blog, 2014 was a year when IT got BYOD wrong. In an article based on the results from a Bitdefender survey Darkreading said the numbers prove that we’re doing BYOD wrong.Read More
It’s been 30 years since mobile devices like the Tandy Model 100 (the first “notebook” computer with a built-in modem) and the Motorola Dyna TAC (aka the brick phone) first made their way into the workplace. Mobile devices of all kinds are now so common that most employees don’t even give their use a second thought.Read More
In a recent guest post on the Business2Community website, Absolute Software VP Stephen Midgley wrote that while mobile devices have created a productive work environment where nearly everything is instant, collaborative and shareable, employees are also putting valuable company data at risk by “getting up to mischief.”Read More
Researchers at San Francisco security company Cloudmark told Fox Business recently that criminals are exploiting two unfortunate mobile trends to steal data and penetrate company networks via mobile devices. One problematic trend is the increase in mobile phishing attacks launched through common mobile messaging systems like Apple’s iMessage.Read More
Until the 21st century, only a very few professionals – doctors, firefighters, police officers – were “on call” when they weren’t actually at work. They carried pagers, or had a regular “check-in” time with an answering service.Read More
As you may have noticed, Breezy suffered a service disruption for approximately 11 hours on Monday, Dec 1 PST. No customer data was compromised and the majority of our users were unaffected, but many of you were unable to print or to access the Dashboard, our support site or our website during this outage.
The outage was due to a DDoS attack against our DNS system, DNSimple. DNS systems such as DNSimple tell computers how to use domain names like "breezy.com" to reach servers on the Internet. During the attack, DNSimple's system became so overwhelmed that it was unable to respond timely to many requests -- so if your computer or mobile device tried to reach anything (including our API) at the "breezy.com" domain, it very likely received a "name server error", and the request failed.
What We're Doing About It
DNSimple itself is taking a number of actions to mitigate future attacks, and has posted a full postmortem on their own blog. Their handling of the incident has been exemplary, and is one of the reasons we've chosen to stick with them. However, for our part, we'll also be adding a backup DNS system to provide failover support in case they ever suffer a similar outage.
Our uptime over the past year sits at 99.92%, but we will continue to invest in infrastructure improvements to bring that number higher.
That said, the reality is that 100% uptime is impossible to guarantee, and we want you to know what's happening should any outage ever occur in the future. During any incident, we will always post up-to-date information via our Twitter feed (@Breezy), and we have created a dedicated status page, hosted on separate servers with separate DNS, at www.breezystatus.com.
Our highest priority is the success of our customers, and we sincerely apologize for the disruption to your business that this outage caused. Thank you for your continued support!