就算你不好「Pokemon Go」，身邊總會有人在玩。員工在休息時把玩手機其實無傷大雅，我們也很難杜絕「寵物小精靈」在辦公室的出現。但企業在考慮保安原則時，仍要兼顧安全與效率。企業在決定採用個別雲端應用時，原來可借鏡同類的「Pokemon Go」的一些成功元素。
(Note: This article is a repost from Security Intelligence)
If you haven’t played the new “Pokemon Go” game yourself, someone close to you definitely has. The game has gone viral since its release, and it has people out in droves wandering around neighborhoods looking for Pikachu.
Five Lessons From ‘Pokemon Go’
In the workplace, cloud apps such as “Pokemon Go” are wildly popular — and have been for a while. We all want to play, but CISOs must consider some general security requirements to be both efficient and safe.
Here are five requirements from “Pokemon Go” that can be applied to adopting cloud apps in your organization.
(This article is a repost from A Smarter Planet Blog)
Over the past two decades, the Internet, cloud computing and related technologies have revolutionized many aspects of business and society. These advances have made individuals and organizations more productive, and they have enriched many people’s lives.
Yet the basic mechanics of how people and organizations forge agreements with one another and execute them have not been updated for the 21st century. In fact, with each passing generation we’ve added more middlemen, more processes, more bureaucratic checks and balances, and more layers of complexity to our formal interactions–especially financial transactions. We’re pushing old procedures through new pipes.
This apparatus–the red tape of modern society–extracts a “tax” of many billions of dollars per year on the global economy and businesses.
What can be done? One potential solution is an intriguing technology called blockchain, which is little understood outside a small fraternity of computer scientists.
網絡罪行日趨嚴重，社會各界尤須多加瞭解暗黑網絡 (Dark Web)：循正常途徑接觸不到的地下網絡。其實，要進入暗黑網絡殊不困難，而這正為企業平添許多風險。
透過免費下載的洋蔥路由器 (Tor) 軟件，人人皆可連上暗黑網絡，過程不著痕跡，身份因而得以隱藏。此匿名通訊系統，對於新聞調查、情報收集及國家安全等事務至為重要；然而，犯罪份子亦多用其來掩飾身份，進行非法勾當。