{"id":12216,"date":"2015-01-14T14:31:45","date_gmt":"2015-01-14T14:31:45","guid":{"rendered":"http:\/\/blog.greenpages.com\/?p=4686"},"modified":"2015-01-14T14:31:45","modified_gmt":"2015-01-14T14:31:45","slug":"2015-predictions-end-user-computing-and-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/2015-predictions-end-user-computing-and-security\/","title":{"rendered":"2015 Predictions: End User Computing and Security"},"content":{"rendered":"<p>Earlier in the week,\u00a0we posted some <a title=\"2015 predictions\" href=\"http:\/\/blog.greenpages.com\/cloud-computing\/2015-predictions-cloud-software-defined\/\" >2015 predictions<\/a> from Chris Ward and John Dixon. These predictions covered cloud, the internet of things and software defined technologies. Here are a few quick predictions around\u00a0end user computing and security\u00a0from Francis Czekalski and Dan Allen. <span id=\"more-4686\"><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"francis czekalski\" href=\"http:\/\/blog.greenpages.com\/end-user-computing-2\/vdi-dont-need-take-nothing-approach\/\" >Francis Czekalski<\/a>, Practice Manager, End User Computing<\/em><\/p>\n<p>Short and sweet \u2013 here are four\u00a0things to keep an eye on in 2015 around end user computing:<\/p>\n<ul>\n<li>More integration with mobile devices<\/li>\n<li>Wrappers for Legacy Applications to be delivered to IOS devices<\/li>\n<li>Less and less dependency for traditional desktops and more focus of delivery on demand<\/li>\n<li>Heightened focus on data security<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/blog.greenpages.com\/wp-content\/uploads\/Becker_Francis-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-4688\" src=\"http:\/\/blog.greenpages.com\/wp-content\/uploads\/Becker_Francis-2.jpg\" alt=\"end user computing and security\" width=\"441\" height=\"329\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><em>Francis presenting at GreenPages&#8217; annual Summit event<\/em><\/p>\n<p><em><a title=\"dan allen wireless\" href=\"http:\/\/blog.greenpages.com\/network-infrastructure\/whats-wireless-strategy\/\" >Dan Allen<\/a>, Solutions Architect<\/em><\/p>\n<p>Hacktimonium! Remember when only big companies got spam? Then small companies? Then individuals? The same is happening with hacking and digital intrusion. This trend will continue into 2015. Having a Firewall isn\u2019t going to be enough; you need to have some sort of implemented Intrusion Prevention Services like an ASA with sourcefire, Radware appliance, or even some of the smaller brands have a Unified Threat Management piece.<\/p>\n<p>A Year in review: Who got hacked last year?<\/p>\n<p>The Big Ones<\/p>\n<ul>\n<li>Apple\u2019s iCloud \u2013 Individual accounts hacked.<\/li>\n<li>JP Morgan Chase \u2013 Enterprise network hacked<\/li>\n<li>Sony \u2013 Individual and then enterprise hack<\/li>\n<li>UPS<\/li>\n<li>Target<\/li>\n<\/ul>\n<p>A list of others you might know.<\/p>\n<ul>\n<li>AOL<\/li>\n<li>Ebay<\/li>\n<li>Living Social<\/li>\n<li>Nintendo<\/li>\n<li>Evernote<\/li>\n<li>USPS<\/li>\n<li>Blizzard<\/li>\n<li>SnapChat<\/li>\n<li>NeimanMarcus<\/li>\n<li>Home Depot<\/li>\n<li>Washington State Justice Computer Network<\/li>\n<li>Yahoo-Japan<\/li>\n<li>Dominos-France<\/li>\n<\/ul>\n<p>The final word here? You Won\u2019t Know You\u2019ve Been Hacked Until It\u2019s Already Gone.<\/p>\n<p>What do you think 2015 has in store around end user computing and security?<\/p>\n<p>&nbsp;<\/p>\n<p><em>By <a title=\"ben stephenson\" href=\"https:\/\/twitter.com\/BenStephenson1\" >Ben Stephenson<\/a>, Emerging Media Specialist<\/em><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=xmeF-c7-0mE:iKoAcQOpOtA:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=xmeF-c7-0mE:iKoAcQOpOtA:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?i=xmeF-c7-0mE:iKoAcQOpOtA:-BTjWOF_DHI\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=xmeF-c7-0mE:iKoAcQOpOtA:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?i=xmeF-c7-0mE:iKoAcQOpOtA:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=xmeF-c7-0mE:iKoAcQOpOtA:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/JourneyToTheCloud\/~4\/xmeF-c7-0mE\" height=\"1\" width=\"1\" alt=\"\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier in the week,&nbsp;we posted some 2015 predictions from Chris Ward and John Dixon. These predictions covered cloud, the internet of things and software defined technologies. Here are a few quick predictions around&nbsp;end user computing and security&nbsp;from Francis Czekalski and Dan Allen. &nbsp; Francis Czekalski, Practice Manager, End User Computing Short and sweet &ndash; here&hellip;<a href=\"http:\/\/blog.greenpages.com\/featured\/2015-predictions-end-user-computing-and-security\/\">Read More &raquo;<\/a><\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1494,179],"tags":[118],"class_list":["post-12216","post","type-post","status-publish","format-standard","hentry","category-end-user-computing","category-featured","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/12216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=12216"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/12216\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=12216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=12216"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=12216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}