Survey Says… Individuals Would Rather Lose Wallet, Than Mobile Device

Let’s face it – we trust mobile devices with some of our most priceless information, from photos to bank account numbers to work emails. But with the rise of BYOD and the fact that every 3 minutes a personal device is remotely wiped by an employer, it’s not surprising that recent findings indicate some people would rather lose their wallet than their mobile device.

In a recent study, we asked more than 1,000 respondents their views on corporate BYOD policies and the value they place on personal data contained on their mobile devices. Let’s take a look at the top issues employees are facing when it comes to BYOD. 

  1. Employer control is impacting BYOD adoption. Many employers have incorporated remote wiping into their BYOD policies and security strategy. However, 71 percent of respondents said they would avoid using their personal device for work if they knew it could be completely wiped if the device was lost or they left the company. 
  1. BYOD policies affect how long it takes employees to report missing devices. The chances of corporate data being accessed by outside sources when a device is lost or stolen increases with time. With the threat of remote wiping, 41 percent of employees would wait a few hours to over a week to report their phone missing. 
  1. Privacy invasion is a top concern. The possibility of employer overreach is a top concern when it comes to BYOD. Employer access to personal information was ranked as the most concerning by individuals. 
  1. Tracking location can be seen as less egregious than wiping a device. The importance of personal information stored on mobile devices is valued more than privacy. More than half of respondents would rather let an employer track their location than wipe data such as personal photos, contacts and email.

Although employees have significant concerns about privacy and employer controls, they do not have to be a barrier to BYOD enablement or adoption if companies shift their BYOD security strategy from controlling the device to controlling the data. By leveraging the right BYOD approach, companies can ensure that data is better protected while keeping employees happy. Without the threat of remote wiping or privacy invasion, employees are more likely to adopt BYOD as well as protect corporate data without hesitating to report a lost or stolen device. To see our full survey findings, check out our interactive results page.

Posted in Bring-Your-Own-Device | Tagged , , , , , , | Leave a comment

Avoiding E-Fail

Clicking “send” is almost too easy. We’ve all had those moments when we wince after realizing we sent an email a little too soon. Maybe you attached the wrong file or realized you copied someone that you shouldn’t have.

But as painful as these moments are, sometimes the result can be far worse than slight embarrassment.

Who did I send that to again?

You’re going on hour 15 of your “eight-hour” work day. Needless to say, you’re a little groggy. Checking your watch, you realize you’re about to miss the deadline for the billing cycle.

Quickly, you pull the patient records for everyone who’s received treatment in the past month so that their claims can be processed.

What was that guy’s email again? Rick something? Good thing my email remembers it. Thank you auto-populate.

Sent. And that’s when you do a double take.

Image: http://www.reactiongifs.com/r/Ellen-Selfie.gif

Image: Reaction GIFs (http://www.reactiongifs.com/r/Ellen-Selfie.gif)

Wait, who did I just send that to?

Rick Johnson at United Healthcare?! … That was supposed to go to Rick Johnston at Aetna!!

Image: http://2.media.todaysbigthing.cvcdn.com/15/55/5db85500cc71595bd2ddab0112d87abc.gif

Image: http://2.media.todaysbigthing.cvcdn.com/15/55/5db85500cc71595bd2ddab0112d87abc.gif

Don’t be the guy who accidentally sends 1,200 patient records to the wrong organization.

Wait, what was that attachment?

You just spent the weekend slaving away on that report your boss dropped on your desk Friday afternoon. You’re coming down from your caffeine high, but you know you’ve nailed it.

Image: http://www.diaryofthedad.co.uk/2014/06/tips-for-prs/

Image: http://www.diaryofthedad.co.uk/2014/06/tips-for-prs/

Wanting to show your boss how dedicated you are, you send it to him first thing Monday morning. Just need to make sure you attach the right thing — 090214UpdatedRegionalReport.docx — OK, sent! Now just sit back and wait for the praise to pour in.

You wonder why it’s taking so long for him to respond. Did your email go through?

You attached 090214UpdatedResume.docx?! “Oh no, I can explain!”

Image: http://gifrific.com/wp-content/uploads/2014/01/Girl-Misses-Seat-and-Falls-to-Ground.gif

Image: Gifrific (http://gifrific.com/)

There’s Always One

Jason has been slacking recently, and his performance is only going in one direction: down. Despite your coaching and multiple warnings, he just can’t seem to get it together. He’s got to go.

Jason, you’re fired.

Image: http://www.businessinsider.com/image/4fdf56a56bb3f7ee71000009/what-happens-in-media-planning-donald-trump-youre-fired-gif.gif

Image: Business Insider (http://www.businessinsider.com/)

Good riddance to the bad egg that was bringing everyone down.

But what you don’t realize is that Jason saw this coming. He’s been emailing himself customer lists for weeks, and he even snagged next quarter’s sales leads.

And he’s taking all of that with him to your biggest competitor, where there’s a job waiting for him.

Image: Reaction GIFs (http://www.reactiongifs.com/)

Image: Reaction GIFs (http://www.reactiongifs.com/)

That’s not good.

With protected health information, financial data and other sensitive corporate information exchanged regularly through email, you want to make sure you’re protected. Yes, there’s email encryption. But just in case that email shouldn’t have been sent in the first place, there’s always DLP.

Posted in Data Loss Prevention, Email Encryption | Tagged , , | Leave a comment

#BYODInsights – Here’s the Recap of our Inaugural Twitter Chat with ZDNet’s Ken Hess

This past Thursday, August 21, we hosted our first ever Twitter chat. We were very excited to welcome ZDNet contributor Ken Hess, who fielded questions about BYOD (bring-your-own-device) considerations and best practices from ZixCorp’s Geoff Bibby, VP or Corporate Marketing.

The chat focused on balancing security and employee privacy, bridging the gap between employees and IT, and how Millennials will impact the future of BYOD. Since we’re more than halfway through 2014, we recapped what we’ve seen from BYOD thus far and touched on what we can expect in 2015 and beyond.

You can catch the highlights from the conversation below.

How should companies balance security with employee privacy?

We’re more than halfway through 2014. What’s the most surprising thing you’ve seen so far this year?

How do you think the Millennial generation will influence BYOD adoption rates?

Still can’t get enough? You can check out the full chat here. And to keep the conversation going, just remember to use the hashtag #BYODInsights, or tweet us at @ZixCorp

Posted in Bring-Your-Own-Device | Tagged , , , , | Leave a comment

Q&A with ZixCorp’s Design Team — Balancing Security with the User Experience

User experience (or lack of) is often one of the biggest barriers companies face when it comes to employee buy-in and compliance of security solutions. We sat down with ZixCorp’s user design team for a peek into how they design products that aren’t just at the top of the security game — but also easy to learn and use.

Enjoy the Q&A below, and feel free to let us know your thoughts on what it takes to create a security solution that users love!

  • What goes into designing Zix solutions? 

When designing products or features, we are extremely user-focused and want to make sure we are taking their feedback into consideration. We analyze any information our product management team collects from customers and through usability studies to determine what users want We then work as a team through an iterative process to come up with the best feature design. This process really allows us to focus in on what our users want and provide them with the best product available.

  • How have you seen Zix solutions evolve over the years?

In the last five years we have worked to align all the Zix products with one another since they originally looked and operated differently. Now, a number of our products are consistent across several facets — in their look and feel, in how you access them and in the heuristics. This gives users the assurance that their experience with one Zix product will assist them when using other Zix products.

  • Do you design products differently depending on the intended users?

Absolutely! Our ZixOne administrator tool was designed specifically for the administrators that would be using it. We always have the same goal: to make the product easy-to-use by making sure buttons and tools are where the user expects them to be. Sometimes when form factors are different, the placement of controls is not consistent within the same ecosystem, like with the ZixOne phone application to the ZixOne tablet application. The experience is familiar to the user, but slightly different.

  • How does design and user experience play a role in employee adoption of a product?

We believe that if you put a product in front of users and they have to travel a large learning curve, they will reject it. If users don’t understand the product or have to ask a lot of questions about how to navigate, they tend to give up. Our goal is to avoid a situation where users give up and do not use the product.

Along those lines, our design philosophy is to provide people with interactions they are already familiar with. Apple, Android and Windows have spent a long time training people on how to use their products. It was said early on when the iPod came out that the iPod Touch was simply a training tool to teach users how to interact with an iPhone. We want to use what’s already in users’ knowledge bank to provide them with the tools they need to get the job done.

  • Are there any specific challenges to designing a security product?

Definitely. Our QA team is embedded with us and involved in the design process, from the very beginning, up until the product goes out the door. They help us catch everything, from design issues to security issues. We also have a security testing period that happens after we have designed the product to ensure that everything is secure and up to Zix standards. The testing period can change user design as well, and occasionally, we have to make compromises in order to meet security requirements.

  • Do you look to any products for design inspiration?

We are a standards-based design organization, so we look at the standards produced by Apple, Microsoft and Google and try to stick to them as closely as possible. This helps us to stay in that groove of providing something that users already understand.

  • What mistakes do others make when it comes to user experience?

One mistake is designing products that deviate from standards users understand. Designing things that are interesting or exciting can come back to haunt designers, because they could be creating a steep learning curve for adoption. It’s not that the old dog can’t learn new tricks, it’s that the old dog doesn’t want to learn new tricks. And you will find that most of your users are the same way. Yes, a product may be neat, fun and cool-looking, but they don’t want to learn something new — they just want a simple product that is easy to use.

 

Posted in Technology | Tagged , , , | Leave a comment

Customer Spotlight – Early Adopter Continues to Protect Patient Information with Email Encryption

The Final HIPAA Rule went into effect in March of last year. With its release some healthcare organizations, business associates and sub-contractors began to evaluate email encryption for assistance with compliance and to ensure protected health information was “unusable, unreadable, and indecipherable” in transit. However, many healthcare organizations, such as Bay Area Medical Center, were no strangers to the security solution.

In 2004, Bay Area Medical Center in Marinette, Wis., set a goal to meet early HIPAA compliance standards and find a solution that was transparent and easy to use. For the best solution that fit the bill, the medical center’s IT department turned to ZixCorp. Since then, Bay Area Medical Center staff has easily shared encrypted messages with patients and business associates through its use of ZixGateway.

One decade later, Bay Area Medical Center still finds Zix Email Encryption to be the best solution on the market. As Pete Eisenzoph, Director of Information Technology for Bay Area Medical Center, put it:

“When we originally selected Zix Email Encryption, we thought it was the best solution on the market. Ten years later Zix continues to be the leader and provides the ease-of-use that is so critical for our users. By routing outbound communications through ZixGateway, we gain the peace of mind that protected health information is secured and compliant with HIPAA guidelines, no matter who sends the email.”

During the last 10 years, Eisenzoph has seen email encryption take off in the state of Wisconsin. More and more healthcare providers are using Zix Email Encryption, and as a result, sending and receiving encrypted email has never been easier.

A little about Bay Area Medical Center:

  • Located in Northeast Wisconsin
  • 99-bed general acute care hospital
  • Emphasis on heart and vascular care, orthopedics and sports medicine, women’s services, diagnostic radiology, cancer treatment and emergency care

Posted in Email Encryption | Tagged , , , | Leave a comment

Why not encrypt every email? After years of innovation, now you can.

Fun Fact: Today, one million messages are encrypted by Zix on a typical business day. On average, 75 percent of these encrypted messages are sent through Zix Encryption Network to other members.

Earlier this summer we announced the unveiling of Zix Encryption Network (Z.E.N.), a growing community of now more than 10,000 businesses that enables the automatic exchange of encrypted email for all messages between members.

In honor of our growing network, we wanted to bring you even more knowledge with an in-depth eBook surrounding Z.E.N., detailing key milestones and the value of encrypting ALL emails, no matter the content.

In this eBook titled Zix Encryption Network: Years of Innovation Creates the Ultimate Network of Secure Email, you will find detailed sections of information such as:

  • Why Not Encrypt Every Email?
  • Chipping Away the Complexity
  • Automatic Email Encryption
  • A Global Community for Convenience
  • The Final Piece: Scaling to Support All Businesses

Posted in Email Encryption | Tagged , , , | Leave a comment

Announcing Inaugural Twitter Chat featuring ZDNet’s Ken Hess, Thursday August 21

On Thursday, August 21, Zix will host our first-ever Twitter chat from 1:30-2 p.m. CDT!

@ZixCorp is teaming up with ZDNet’s Ken Hess to discuss BYOD (bring-your-own-device) considerations and best practices. This is YOUR opportunity to share thoughts and ask questions around BYOD challenges, opportunities, employee buy-in and anything in between.

Who?

Our VP of Marketing, Geoff Bibby, will ask questions from our @ZixCorp Twitter handle. Our featured panelist, Ken Hess (@kenhess), who tackles BYOD and the consumerization of IT for ZDNet, will also be available to answer questions and guide the conversation. While Geoff and Ken weigh in on questions, it’s up to YOU, the participants, to keep the chat going. If you have an opinion, a story or advice of your own, share it with us!

What?

A Twitter chat is an online conversation that takes place among a group of people on Twitter about a specific topic of interest. A hashtag is used to keep track of the conversation. For this chat, we will use #BYODInsights. You will need a Twitter account to participate.

When?

Thursday, August 21, from 1:30-2 p.m. CT.

Can’t make it? We’ll be providing a recap, so check back on the blog!

Where?

We recommend using a tool to help you keep track of the chat all in one place. With tools like TweetChat or TweetDeck, you can see the real-time conversation of all tweets with the #BYODInsights hashtag. Login with your personal Twitter account, and you will be able to post all of your tweets directly from the site.

Another way to track the chat is by searching #BYODInsights in the search bar at the top of the Twitter homepage.

Why?

BYOD is full of twists and turns — with a variety of devices, new threats, many use cases and more solutions (approaches instead of solutions?) than ever before. This is a great opportunity to talk with peers and experts about what’s on your mind.

How?

  • Make sure to follow the host, @ZixCorp, since we’ll be asking most of the questions that you don’t want to miss!
  • You’ll also want to follow your featured panelist Ken Hess (@kenhess), since he’ll be sharing his expertise on BYOD.
  • Make sure you use the hashtag #BYODInsights in all of your tweets. This ensures that your tweets will be aggregated into the chat stream and people will know you’re participating.
  • We will be asking designated questions throughout the chat. Our questions will start with a “Q” and the question number. Our questions will also be IN ALL CAPS, so that they are easily distinguished from the other tweets in the stream.

Helpful Tips:

  • Be respectful of other participants. Differing opinions are always OK, but express your feelings in a courteous manner.
  • Retweet great comments and engage with other participants.

 

Hope to see you there!

 

Posted in Bring-Your-Own-Device | Tagged , , | Leave a comment

Upcoming Data Loss Prevention (DLP) Webinar: Solutions for Today’s Greatest Security Challenge

Every year, healthcare organizations, financial institutions, government agencies and businesses devote huge investments to prevent threats and boost compliance and security measures.

Yet one salient fact remains: often the worst breaches and policy violations stem from human error — well-meaning employees who have no idea that they are putting patient records, credit card information and client identities at risk.

Often, this data loss occurs through email, such as mentioning restricted information in outside correspondence or attaching documents that may violate customer or patient privacy.

Whether you have tried various failed Data Loss Prevention (DLP) strategies, were intimidated by complex and costly solutions or simply have unanswered questions, join us August 5 at 2 p.m. EDT to learn about the high-priority needs and solutions for one of today’s greatest security challenges — email DLP.

During this webinar, data protection expert John Kindervag of Forrester Research will join Dena Bauckman, ZixCorp’s Director of Product Management, to take your questions and discuss:

  • Creating a process to meet all of your DLP needs
  • ZixDLP, including superior filter, review and analysis functionality
  • And much more

Can’t make it next Tuesday? Stay tuned for an archived recording.

Posted in Data Loss Prevention, Privacy, Technology | Tagged , , , , | Leave a comment

On the Samsung Solutions Exchange, You’re Free to Roam

Employees are now demanding on-the-fly access to corporate email while on the go and flexibility to work beyond their company’s walls and secure networks. At the same time, IT is tasked with ensuring this corporate data still stays secure. However, often this security comes at the expense of employee usability and convenience.

To help bridge the gap, ZixCorp announced this morning that ZixOne is now available on the Samsung Solutions Exchange to help expand the mobile security options for enterprises using Samsung devices.

With ZixOne, companies can support and manage the increasing complexities of a mobile workforce through:

  • Protection of sensitive corporate data in email
  • Convenient employee access to corporate email
  • Compliance reporting to confirm that sensitive data is not exposed when a device is lost or stolen

Because of ZixOne’s unique “no-data-on-device” approach, employees are free to roam while accessing corporate data on their mobile device, and enterprises can rest assured knowing the risk of compromise is mitigated.

Any Questions?

Stay safe out there, and if you have any questions, just give us shout via Twitter (@ZixCorp).

Posted in Bring-Your-Own-Device, Company News | Tagged , , , | Leave a comment

Upcoming BYOD Webinar: State of Mobile Security in 2014

What BYOD challenges, security risks and technologies are companies responding to in 2014?

Find out by joining our webinar on July 15 at 2:00 p.m. ET when we showcase findings from the recent BYOD & Mobile Security Spotlight Report conducted by Holger Schulze of Information Security Community.

More than 1,000 IT decision makers were surveyed about the mobile threats facing their organizations and the BYOD solutions and strategies being used to combat them.

During this webinar, Holger and ZixCorp expert Geoff Bibby will discuss new BYOD insights, surprising trends and fresh perspectives on the state of mobile security. A Q&A will be opened up at the end.

Highlights from the report include:

  • The key drivers for BYOD are about keeping employees mobile (57 percent), satisfied (56 percent) and productive (54 percent)
  • The biggest BYOD security concerns are loss of company or client data (67 percent) and unauthorized access to company data and systems (57 percent)
  • The most common risk control measures are password protection (67 percent), followed by remote wiping of data (52 percent) and use of encryption (43 percent).

Can’t make the webinar? Stay tuned for a summary and archived recording.

Posted in Bring-Your-Own-Device, Technology | Tagged , , , | Leave a comment