From Mobile to Internet of Things: who decides when security is good enough, asks Becrypt at Mobile World Congress 2016 Wednesday 17 February 2016 PDF Print businesses and individuals do need to think more carefully about security and about the potential damage to them as individuals and the organisation Mobile World Congress, Barcelona, 22nd February UKTI Stand 7C40 London, UK – British cyber security specialist, Becrypt, is to host the Dark and Stormy Cyber Security Happy Hour at the Mobile World Congress, being held in Barcelona, 22nd – 25th February. The Dark and Stormy event, which takes place on the UKTI stand, 7C40, on Monday 22nd February, will feature interesting and quirky Pecha Kucha style presentations from a range of UK mobile technology companies, as well as the opportunity to network and enjoy refreshments. Dr. Bernard Parsons, CEO and co-founder of Becrypt, will be posing the thought provoking question: ‘From Mobile to IoT: Who decides when security is good enough?’ Dr Parsons’ presentation echoes the GSMA’s recently published IoT Security Guidelines, making the comparison between historical security issues with mobile technology, and how these issues are set to affect the world of IoT. He goes on to explain that security is not, at this moment, built into the design of wearable technology, and many other internet enabled devices that are around the home and business, commenting on how we should combat this going forward. Representatives from Becrypt will be available on the UKTI stand throughout the duration of Mobile World Congress. Dr Parsons commented; “Long gone are the days when sensitive data was safely locked away only to be accessed by vetted staff using secure connections. Now data is everywhere, and increasingly everything is connected. This connectivity brings many benefits, but businesses and individuals do need to think more carefully about security and about the potential damage to them as individuals and the organisation as a whole should they have a security breach.” Recent findings published by the ICO showed that in the most recent quarter (Q1 2015/16) there was a 22% increase in data breach incidents resulting from loss or theft or unencrypted devices[i]. The European General Data Protection Regulation (EU GDPR) is expected to come into force later this year, and will bring with it severe penalties for compliance failures which could be up to 5% of worldwide turnover. Becrypt recently published a whitepaper about the importance to business of protecting Intellectual Property. The white paper explains why IP should be protected, common mistakes and suggests practical solutions. For a copy: Protecting your business from IP theft -ends- NOTES TO EDITORS About Becrypt Becrypt is a leading supplier of innovative mobile security solutions and services that are Government-certified, suitable for numerous industry sectors. Becrypt provides a range of cyber security solutions to protect data at rest and data in use across a broad range of platforms, including desktops, laptops, tablets and smartphones, running Windows, iOS and Android. Becrypt’s secure thin client technology supports virtual data infrastructure (VDI) access, enabling secure and rapid IT transformation within the enterprise, as well as cost effective secure remote access. Through its focus on product assurance, multiple platforms and centralised management, Becrypt’s solutions enable the most security conscious organisations to deliver cost effective compliance, whilst maintaining flexibility, choice and usability for their users. As a leading supplier of encryption technology to the UK Government, Ministry of Defence and UK Police, Becrypt also offers cyber security consultancy and bespoke systems. Becrypt has offices in London, UK, and McLean, VA, USA. For more information visit: BECRYPT Editors Contacts Grace Carter Marketing Manager Becrypt Tel: 0845 838 2050 Email: firstname.lastname@example.org Andreina West/Mary Phillips PR Artistry Limited Tel: +44 (0) 1491 639500 Email: email@example.com ICO website This press release was distributed by ResponseSource Press Release Wire on behalf of PR Artistry in the following categories: Computing & Telecoms, for more information visit http://pressreleasewire.responsesource.com/about.