Blog Banner

Breezy Blog - Mobile Printing Experts

Why Data Privacy Day Should Matter to the Enterprise

Posted on Thu, Jan 29, 2015

Did your company celebrate data privacy day yesterday? Most did not – and that’s a shame.

Read More

Tags: mobile security, preventing a data breach, enterprise security strategy, BYOD security, Data Privacy Day

Breezy Celebrates Integration with All the Leading EMM’s in Gartner’s 2014 Enterprise Mobility Management Magic Quadrant

Posted on Tue, Jan 27, 2015

Each year, Gartner Research reviews the leading enterprise mobility management (EMM) suites, and ranks them based on performance, customer feedback, and product features as well as company stability. The 2014 Gartner Enterprise Mobility Management Magic Quadrant report lists five leaders in the category:

Read More

Tags: secure mobile printing, enterprise mobility, EMM, mobile device security,, Gartner EMM Magic Quadrant

Don’t Forget MFPs When Planning Your Security Strategy

Posted on Thu, Jan 22, 2015

The Information Commissioner’s Office (ICO) for the United Kingdom recently issued its annual report on fines given to companies that failed to protect consumer data, and a surprising number of those fines were given out for data that involved data loss traced to multi-function devices (MFDs) such as copiers and scanners or multi-function printers (MFPs), including printed records and faxes.

Read More

Tags: secure mobile printing, enterprise security strategy, multi-function printer security

How to Keep Your Data Safe on Their Mobile Devices

Posted on Tue, Jan 20, 2015

As any IT professional can attest, the main challenge with BYOD can be summed up in a single sentence. “IT does not control the content and configuration of the device.”

Since the mobile devices belong to individual employees, IT policies calling for the company to view or wipe personal data are problematic. So most enterprise mobility management or mobile device management tools piggy-back on top of the user’s personal data, so that it can be removed when the device is no longer used for work.

Read More

Tags: secure mobile printing, mobile security, MobileIron, EMM, data security, enterprise mobility management

Why Wearables May be a CIOs New Nightmare

Posted on Fri, Jan 09, 2015

It’s hardly news to CIOs and other IT professionals that smartphones are an integral part of everyday life for most working adults. But it was still a bit of a shock when Yahoo CEO Marissa Mayer stood up at the 2014 World Economic Forum in Davos to cite research that the average person now checks their smartphone a staggering 150 times a day.

Shortly thereafter, Salesforce CEO Marc Benioff showed the FitBit device he said had helped him lose 30 pounds, and noted that “I lost 30 pounds wearing the Fitbit; I do 10,000 steps a day. But here’s the amazing thing: Last week I got a call from Michael Dell. He asked if I’m feeling okay. ‘Why?’ I asked him. ‘I’m worried about you,’ he said, ‘because I’m your friend on the Fitbit network and noticed you hadn’t worked out in the last 3 days and wanted to make sure you’re okay,’ said Benioff.

Read More

Tags: BYOD, mobile device security,, wearables, wearable security

Welcome to 2015: Time to Give Up Outdated Security Models

Posted on Wed, Jan 07, 2015

Once upon a time, the goal of IT security professionals was to create an impenetrable security wall to protect company assets from outside thieves and hackers. IT World Canada says that’s an outdated idea, and CIOs in 2015 have given it up in favor of more achievable goals.

The article by Nestor Arellano says that mobile device headaches have changed cyber security forever, and that connected devices of all kinds have created a third platform that forces CIO’s to shift their focus towards risk assessment rather than the “outdated perception” of creating an impenetrable wall around the corporate network.

Read More

Tags: secure mobile printing, mobile device security,, new mobile security threats 2015, ransomeware, IoT security

Will 2015 be the Year IT Gets BYOD Right?

Posted on Thu, Dec 18, 2014

According to the Darkreading security blog, 2014 was a year when IT got BYOD wrong. In an article based on the results from a Bitdefender survey Darkreading said the numbers prove that we’re doing BYOD wrong.

Read More

Tags: secure mobile printing, IT security, BYOD, mobile device security,, IT security planning

Mobile Devices at 30: How Mature is Your Mobility Strategy?

Posted on Tue, Dec 16, 2014

It’s been 30 years since mobile devices like the Tandy Model 100 (the first “notebook” computer with a built-in modem) and the Motorola Dyna TAC (aka the brick phone) first made their way into the workplace. Mobile devices of all kinds are now so common that most employees don’t even give their use a second thought.

Read More

Tags: mobile device management, IT mobility planning, mobile device security,, enterprise mobility management

Combating (Hidden) Employee Behavior that Puts Data at Risk

Posted on Thu, Dec 11, 2014

In a recent guest post on the Business2Community website, Absolute Software VP Stephen Midgley wrote that while mobile devices have created a productive work environment where nearly everything is instant, collaborative and shareable, employees are also putting valuable company data at risk by “getting up to mischief.”

Read More

Tags: BYOD, data security, mobile device security,

Unencrypted Data, Rogue Apps, Spam Threaten Mobile Device Security

Posted on Tue, Dec 09, 2014

Researchers at San Francisco security company Cloudmark told Fox Business recently that criminals are exploiting two unfortunate mobile trends to steal data and penetrate company networks via mobile devices. One problematic trend is the increase in mobile phishing attacks launched through common mobile messaging systems like Apple’s iMessage.

Read More

Tags: mobile device management, mobile app security,, mobile device security,, analyst reports mobile devices

Email Subscription

Follow Us

Browse by Tag