SlideShare une entreprise Scribd logo
1  sur  12
Mobile Security Trends in the Workplace 
June 2014 
1 
By 2016, the number of smartphones is expected to 
surpass the number of people on the planet. Whether 
IT knows it or not, mobile devices are being used in 
the workplace.
2 
Quick Facts about BYOD 
 Gartner predicts that 80% of all user access 
to the enterprise will be via mobile devices 
by 2020 
 38% of companies expect to stop providing 
devices to workers by 2016
3 
Summary of Key Findings 
 64% of IT professionals report that mobile security is a top priority for 2014 
 90% of employees use personal smartphones for work, yet fewer than half of organizations 
have a mobile security policy in place 
 More than half of IT professionals list “securing mobile data” as most important, however only 
13% feel their current solution is effective in doing so 
 71% of employees use 1-5 applications to access corporate data 
 Apple devices have a slight lead over Android devices: 62% versus 53% 
 Employee’s top concerns are privacy (76%) and loss of personal data (82%); however the 
majority of IT professionals are overall unconcerned with employee privacy
Mobile Security is a Top Priority for 2014 
Quick Facts 
 64% of IT professionals rank mobile security as a top concern for 2014 
 36% report that mobile security is not a top 3 priority 
4
Organizations Still Navigating BYOD 
BYOD security partially depends on employee compliance, so the disconnect between the enterprise 
policies and employee knowledge/compliance creates unwanted opportunities for unintended mobile data 
leakage. 
Quick Facts 
 90% of employees use personal smartphones and 35% use personal tablets at work 
 40% of employees use two or more devices at work 
Yet… 
 Only 40% of IT professionals have a BYOD policy in place 
 An alarming 33% of employees do not know whether or not their organization has a BYOD policy in 
5 
place 
 Of those that have some knowledge of their organization’s BYOD policy, 40% complain about the policy, 
and 6% percent admit to blatant disregard for the policy
Beyond the Device: Focus on Applications 
While the entrance of personal devices in the workplace raises concern over the security of corporate data, the 
applications used to modify and move this data on mobile devices compounds that concern. Unfortunately, 
without insight into which apps employees are actually using, IT really has no way of knowing what to secure, or 
how. 
Quick Facts 
 30.5% of IT professionals believe that none of their employees are using unapproved apps 
 17% of IT professionals believe that the majority or all of their employees using unapproved apps 
 71% of employees use 1-5 apps to access or modify corporate data on their device 
6
Traditional Mobile Security Solutions Miss the Big Picture 
… 
It’s About the Data 
Quick Facts 
 56% of IT professionals list “securing mobile data” as the most important success criteria for mobile 
security 
…Yet only 13% feel that their current mobile security solutions are effectively securing mobile data 
 41% of IT professionals report “reducing data loss” as an important criterion 
…Yet only 13% feel that their current solutions are effectively reducing data loss 
7
Apple vs. Android in the Workplace 
IT needs to be able to secure both types of devices in today’s BYOD mobile landscape 
Quick Facts 
While iOS devices (62%) have a slight lead over Android devices (53%) in the workplace, the combination 
of smartphones and tablets have created a fairly even playing field. 
8
Times are Changing: Security vs. Privacy 
When asked to compare their perspective on employee privacy issues now versus five years ago, there 
is a clear shift. Today, there is a much greater balance between mitigating risk and addressing employee 
concerns and privacy. 
Quick Facts 
 Five years ago, 30%of IT professionals would have said “it’s all about risk mitigation. I don’t factor in 
employee concerns.” Today, only 17% take that stance. 
 The majority of IT professionals surveyed are overall unconcerned with employee privacy 
 35% put employee needs on par with security concerns 
 17% not factoring employees’ need at all. 
9
10 
Employees’ Top Concerns 
Employees thought differently… 
Quick Facts 
 Device wipes removing personal data (82%) 
 Invasion of Privacy (76%) 
 Restricted App Access a distant third (20%) 
While technology solutions are part of the mobile security success equation, employee compliance and 
participation is also key. Enterprises that take employee concerns into account will achieve better 
compliance.
The results of this survey further underscores the need for IT to listen to the concerns of the end user. By 
ignoring or downplaying employee concerns over privacy, IT is all but ensuring that these users will continue 
to operate outside the bounds of IT, and further put corporate data at risk – the very thing IT is most concerned 
about. 
The Solution? 
 Continue to audit employee device and app usage for work and create and tune mobile policies 
11 
accordingly. 
 Once aligned, employees will gain the tools needed to work most efficiently, while IT keeps corporate data 
secure.
12 
For more information 
 Follow Bluebox on Twitter @blueboxsec 
 Subscribe to the Bluebox blog 
 Visit our website at http://www.bluebox.com

Contenu connexe

Tendances

Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareChromeInfo Technologies
 
Technology Prescription for Smarter Healthcare
Technology Prescription for Smarter Healthcare Technology Prescription for Smarter Healthcare
Technology Prescription for Smarter Healthcare Samsung Business USA
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...TELKOMNIKA JOURNAL
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data AnalyticsSymantec
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
7 major changes in big data security in 2021
7 major changes in big data security in 20217 major changes in big data security in 2021
7 major changes in big data security in 2021Antenna Manufacturer Coco
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductSalesforce Developers
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Disruptive Enterprise Mobility Infographic
Disruptive Enterprise Mobility InfographicDisruptive Enterprise Mobility Infographic
Disruptive Enterprise Mobility InfographicExclusive Networks
 
It's all about big data
It's all about big dataIt's all about big data
It's all about big dataYuxin Tu, PhD
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
Sameer Mitter |The impact of automation on the workforce
Sameer Mitter |The impact of automation on the workforceSameer Mitter |The impact of automation on the workforce
Sameer Mitter |The impact of automation on the workforceSameer Mitter
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information securityBee_Ware
 
CompTIA Security Study [Report]
CompTIA  Security Study [Report]CompTIA  Security Study [Report]
CompTIA Security Study [Report]Assespro Nacional
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksConstantin Cocioaba
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Spiceworks Ziff Davis
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research ReportPeter Tutty
 

Tendances (18)

Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 
Technology Prescription for Smarter Healthcare
Technology Prescription for Smarter Healthcare Technology Prescription for Smarter Healthcare
Technology Prescription for Smarter Healthcare
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data Analytics
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
7 major changes in big data security in 2021
7 major changes in big data security in 20217 major changes in big data security in 2021
7 major changes in big data security in 2021
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT Product
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Disruptive Enterprise Mobility Infographic
Disruptive Enterprise Mobility InfographicDisruptive Enterprise Mobility Infographic
Disruptive Enterprise Mobility Infographic
 
It's all about big data
It's all about big dataIt's all about big data
It's all about big data
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
Sameer Mitter |The impact of automation on the workforce
Sameer Mitter |The impact of automation on the workforceSameer Mitter |The impact of automation on the workforce
Sameer Mitter |The impact of automation on the workforce
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
CompTIA Security Study [Report]
CompTIA  Security Study [Report]CompTIA  Security Study [Report]
CompTIA Security Study [Report]
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research Report
 

Similaire à Mobile Security Trends in the Workplace

Infographic: Mobile At Work
Infographic: Mobile At WorkInfographic: Mobile At Work
Infographic: Mobile At WorkBlueboxer2014
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudySoftchoice Corporation
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...Javier Gonzalez
 
Ibm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryIbm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryEmisor Digital
 
The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...RES
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITInsight
 
State of the Cloud in 2015
State of the Cloud in 2015State of the Cloud in 2015
State of the Cloud in 2015Skyhigh Networks
 
Consumerization at the Crossroads Infographic
Consumerization at the Crossroads InfographicConsumerization at the Crossroads Infographic
Consumerization at the Crossroads InfographicNetMotion Wireless
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
2013 byod mobile index
2013 byod mobile index2013 byod mobile index
2013 byod mobile indexPrayukth K V
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes MobileNetApp
 

Similaire à Mobile Security Trends in the Workplace (20)

Infographic: Mobile At Work
Infographic: Mobile At WorkInfographic: Mobile At Work
Infographic: Mobile At Work
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
10 Incredible BYOD Facts
10 Incredible BYOD Facts10 Incredible BYOD Facts
10 Incredible BYOD Facts
 
Get Ready for Wearables at Work
Get Ready for Wearables at WorkGet Ready for Wearables at Work
Get Ready for Wearables at Work
 
White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...
 
Ibm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryIbm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summary
 
The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector IT
 
State of the Cloud in 2015
State of the Cloud in 2015State of the Cloud in 2015
State of the Cloud in 2015
 
Consumerization at the Crossroads Infographic
Consumerization at the Crossroads InfographicConsumerization at the Crossroads Infographic
Consumerization at the Crossroads Infographic
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
2013 byod mobile index
2013 byod mobile index2013 byod mobile index
2013 byod mobile index
 
Financial Impact of BYOD Programs
Financial Impact of BYOD ProgramsFinancial Impact of BYOD Programs
Financial Impact of BYOD Programs
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes Mobile
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 

Dernier

Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...nishasame66
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsChandrakantDivate1
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesChandrakantDivate1
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsChandrakantDivate1
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312wphillips114
 

Dernier (6)

Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
 

Mobile Security Trends in the Workplace

  • 1. Mobile Security Trends in the Workplace June 2014 1 By 2016, the number of smartphones is expected to surpass the number of people on the planet. Whether IT knows it or not, mobile devices are being used in the workplace.
  • 2. 2 Quick Facts about BYOD  Gartner predicts that 80% of all user access to the enterprise will be via mobile devices by 2020  38% of companies expect to stop providing devices to workers by 2016
  • 3. 3 Summary of Key Findings  64% of IT professionals report that mobile security is a top priority for 2014  90% of employees use personal smartphones for work, yet fewer than half of organizations have a mobile security policy in place  More than half of IT professionals list “securing mobile data” as most important, however only 13% feel their current solution is effective in doing so  71% of employees use 1-5 applications to access corporate data  Apple devices have a slight lead over Android devices: 62% versus 53%  Employee’s top concerns are privacy (76%) and loss of personal data (82%); however the majority of IT professionals are overall unconcerned with employee privacy
  • 4. Mobile Security is a Top Priority for 2014 Quick Facts  64% of IT professionals rank mobile security as a top concern for 2014  36% report that mobile security is not a top 3 priority 4
  • 5. Organizations Still Navigating BYOD BYOD security partially depends on employee compliance, so the disconnect between the enterprise policies and employee knowledge/compliance creates unwanted opportunities for unintended mobile data leakage. Quick Facts  90% of employees use personal smartphones and 35% use personal tablets at work  40% of employees use two or more devices at work Yet…  Only 40% of IT professionals have a BYOD policy in place  An alarming 33% of employees do not know whether or not their organization has a BYOD policy in 5 place  Of those that have some knowledge of their organization’s BYOD policy, 40% complain about the policy, and 6% percent admit to blatant disregard for the policy
  • 6. Beyond the Device: Focus on Applications While the entrance of personal devices in the workplace raises concern over the security of corporate data, the applications used to modify and move this data on mobile devices compounds that concern. Unfortunately, without insight into which apps employees are actually using, IT really has no way of knowing what to secure, or how. Quick Facts  30.5% of IT professionals believe that none of their employees are using unapproved apps  17% of IT professionals believe that the majority or all of their employees using unapproved apps  71% of employees use 1-5 apps to access or modify corporate data on their device 6
  • 7. Traditional Mobile Security Solutions Miss the Big Picture … It’s About the Data Quick Facts  56% of IT professionals list “securing mobile data” as the most important success criteria for mobile security …Yet only 13% feel that their current mobile security solutions are effectively securing mobile data  41% of IT professionals report “reducing data loss” as an important criterion …Yet only 13% feel that their current solutions are effectively reducing data loss 7
  • 8. Apple vs. Android in the Workplace IT needs to be able to secure both types of devices in today’s BYOD mobile landscape Quick Facts While iOS devices (62%) have a slight lead over Android devices (53%) in the workplace, the combination of smartphones and tablets have created a fairly even playing field. 8
  • 9. Times are Changing: Security vs. Privacy When asked to compare their perspective on employee privacy issues now versus five years ago, there is a clear shift. Today, there is a much greater balance between mitigating risk and addressing employee concerns and privacy. Quick Facts  Five years ago, 30%of IT professionals would have said “it’s all about risk mitigation. I don’t factor in employee concerns.” Today, only 17% take that stance.  The majority of IT professionals surveyed are overall unconcerned with employee privacy  35% put employee needs on par with security concerns  17% not factoring employees’ need at all. 9
  • 10. 10 Employees’ Top Concerns Employees thought differently… Quick Facts  Device wipes removing personal data (82%)  Invasion of Privacy (76%)  Restricted App Access a distant third (20%) While technology solutions are part of the mobile security success equation, employee compliance and participation is also key. Enterprises that take employee concerns into account will achieve better compliance.
  • 11. The results of this survey further underscores the need for IT to listen to the concerns of the end user. By ignoring or downplaying employee concerns over privacy, IT is all but ensuring that these users will continue to operate outside the bounds of IT, and further put corporate data at risk – the very thing IT is most concerned about. The Solution?  Continue to audit employee device and app usage for work and create and tune mobile policies 11 accordingly.  Once aligned, employees will gain the tools needed to work most efficiently, while IT keeps corporate data secure.
  • 12. 12 For more information  Follow Bluebox on Twitter @blueboxsec  Subscribe to the Bluebox blog  Visit our website at http://www.bluebox.com