Blog Banner

Breezy Blog - Mobile Printing Experts

Five Steps to Minimizing Risk from a Data Breach

Posted on Tue, May 19, 2015

Read More

Tags: preventing a data breach, data security, mobile device security,, network security, how to respond to a data breach

Balancing Security & Privacy: How to Find the Right EMM Solution

Posted on Thu, May 14, 2015

Questions for CIOs & IT managers: Do you like your MDM or EMM solution? Do your executives and average employees like it? Or do they feel as if the solution you’ve deployed limits their choices, or makes day-to-day productivity harder?

Read More

Tags: MDM, BYOD, enterprise mobility, EMM, BYOD planning, COPE mobile device management

Lawyers & Mobile Devices: Time, Money, Security Issues

Posted on Tue, May 12, 2015

The first time moviegoers saw a “mobile” phone in a movie happened in the 1954 romantic comedy Sabrina, starring Audrey Hepburn. That first glimpse of a mobile phone shows a lawyer, Linus Larabee (played by Humphrey Bogart), taking care of business while he’s being chauffeured from his Long Island estate to his offices in Manhattan.

Read More

Tags: law firm mobile security, secure mobile printing for law firms, ILTA technology survey, how lawyers use mobile devices

Mobile Now the Primary Screen for U.S. Search

Posted on Thu, May 07, 2015

It’s official. In 10 countries including the U.S. and Japan, more Google searches take place on mobile devices than on computers. Google made the announcement on May 5 via its blog. The search engine giant says that over half of all Google searches now take place on mobile devices.

Read More

Tags: secure mobile printing, mobile printing, Google End-to-End encryption, Samsung Galaxy Note 4, mobile printing for the eneterprise, iPhone 6, phablets

5 Years On: 5 Lessons the iPad Taught Us

Posted on Tue, Apr 28, 2015

On April 3, 2010, customers lined up around the block to buy the Apple iPad. Some journalists mocked it as a solution looking for a problem – others proclaimed it to be the end of the laptop and desktop computer. A quarter of a billion iPads later, the device still has its detractors and fans, but we’ve all learned a few important lessons about how mobile devices affect the work environment since the iPad’s introduction.

Read More

Tags: iPad, iPad printing, enterprise iPad deployment

Enterprise Mobile Security: Does a New Study Expose EMM’s Limits?

Posted on Tue, Apr 21, 2015

A new study conducted by Decisive Analytics for CUPP Computing shows that across the U.S., Europe, and Asia the majority (68%) of enterprise IT decision makers say that preventing or mitigating targeted attacks is the single most urgent mobile security priority, closely followed by achieving and maintaining regulatory compliance (66%).

Read More

Tags: IT security, Breezy, EMM, enterprise mobility security

Mobile Security Demographics: High-Paid Young Men are Riskier

Posted on Thu, Apr 16, 2015

Aruba Networks is calling for businesses worldwide to take action as a new mobile security risk report reveals that businesses are ill prepared for the high-risk, high-growth mindset of what it calls the #GenMobile workforce, creating alarming disparity around security practices in the corporate world. The chasm that is exposed between age, gender, income level, industry and geographic location has a direct effect on the security of corporate data.

Read More

Tags: data security, mobile device security,, new mobile security threats 2015, Aruba Networks

Pentagon, White House Moving to BYOD

Posted on Tue, Apr 14, 2015

This summer, the Defense Department is launching a bring your own device (BYOD) pilot program at the Pentagon. It’s the latest in a series of high-profile government departments to change a long-standing policy barring government employees in many departments from bringing personally owned devices to work. The Pentagon’s BYOD pilot will involve users within the DoD headquarters staff and will help evaluate the security concerns of using personal devices at work, DoD CIO Terry Halvorsen said in a March 18 call with reporters.

Read More

Tags: BYOD security, BYOD planning, Pentagon, Federal government IT, White House, White House Digital Government Strategy, mobility planning for U.S. federal government

Mobile Threat Report: 391% Increase in Malicious Apps

Posted on Thu, Apr 09, 2015

A new report released yesterday by the Pulse Secure Mobile Threat Center analyzed threats to the enterprise during 2014 from mobile devices. The report, available for download here, found nearly a million (931,620) unique malicious applications during 2014 – a 391% increase over 2013.

Read More

Tags: Android, mobile device security,, BYOD security

Why Email is a Hot IT Topic Again

Posted on Tue, Apr 07, 2015

The first email was sent by Ray Tomlinson to himself in 1971, and it’s been the workhorse powering corporate IT for decades. But lately, many CIOs and IT staffs are taking a closer look at email again. Now that most employees are connected to email around the clock, the once nearly-forgotten workhorse has become a hot topic in IT circles again.

Read More

Tags: secure mobile printing, email printing from smartphones, how to email a document to a printer, email printing

Email Subscription

Follow Us

Browse by Tag