Did your company celebrate data privacy day yesterday? Most did not – and that’s a shame.Read More
Each year, Gartner Research reviews the leading enterprise mobility management (EMM) suites, and ranks them based on performance, customer feedback, and product features as well as company stability. The 2014 Gartner Enterprise Mobility Management Magic Quadrant report lists five leaders in the category:Read More
The Information Commissioner’s Office (ICO) for the United Kingdom recently issued its annual report on fines given to companies that failed to protect consumer data, and a surprising number of those fines were given out for data that involved data loss traced to multi-function devices (MFDs) such as copiers and scanners or multi-function printers (MFPs), including printed records and faxes.Read More
As any IT professional can attest, the main challenge with BYOD can be summed up in a single sentence. “IT does not control the content and configuration of the device.”
Since the mobile devices belong to individual employees, IT policies calling for the company to view or wipe personal data are problematic. So most enterprise mobility management or mobile device management tools piggy-back on top of the user’s personal data, so that it can be removed when the device is no longer used for work.Read More
It’s hardly news to CIOs and other IT professionals that smartphones are an integral part of everyday life for most working adults. But it was still a bit of a shock when Yahoo CEO Marissa Mayer stood up at the 2014 World Economic Forum in Davos to cite research that the average person now checks their smartphone a staggering 150 times a day.
Shortly thereafter, Salesforce CEO Marc Benioff showed the FitBit device he said had helped him lose 30 pounds, and noted that “I lost 30 pounds wearing the Fitbit; I do 10,000 steps a day. But here’s the amazing thing: Last week I got a call from Michael Dell. He asked if I’m feeling okay. ‘Why?’ I asked him. ‘I’m worried about you,’ he said, ‘because I’m your friend on the Fitbit network and noticed you hadn’t worked out in the last 3 days and wanted to make sure you’re okay,’ said Benioff.Read More
Once upon a time, the goal of IT security professionals was to create an impenetrable security wall to protect company assets from outside thieves and hackers. IT World Canada says that’s an outdated idea, and CIOs in 2015 have given it up in favor of more achievable goals.
The article by Nestor Arellano says that mobile device headaches have changed cyber security forever, and that connected devices of all kinds have created a third platform that forces CIO’s to shift their focus towards risk assessment rather than the “outdated perception” of creating an impenetrable wall around the corporate network.Read More
According to the Darkreading security blog, 2014 was a year when IT got BYOD wrong. In an article based on the results from a Bitdefender survey Darkreading said the numbers prove that we’re doing BYOD wrong.Read More
It’s been 30 years since mobile devices like the Tandy Model 100 (the first “notebook” computer with a built-in modem) and the Motorola Dyna TAC (aka the brick phone) first made their way into the workplace. Mobile devices of all kinds are now so common that most employees don’t even give their use a second thought.Read More
In a recent guest post on the Business2Community website, Absolute Software VP Stephen Midgley wrote that while mobile devices have created a productive work environment where nearly everything is instant, collaborative and shareable, employees are also putting valuable company data at risk by “getting up to mischief.”Read More
Researchers at San Francisco security company Cloudmark told Fox Business recently that criminals are exploiting two unfortunate mobile trends to steal data and penetrate company networks via mobile devices. One problematic trend is the increase in mobile phishing attacks launched through common mobile messaging systems like Apple’s iMessage.Read More