Breezy, the mobile printing leader, announced today that it has joined the MaaS360 WorkPlace Partner Program. Breezy is now available in the MaaS360 Market, and will leverage the MaaS360 WorkPlace SDK to enable enterprise-grade security controls for protection of corporate data.Read More
So an attacker hacks into your printer. That’s no big deal, right? Printers don’t have much in the way of memory, so how much data can really be at risk if someone hacks into one?
Dallas attorney Shawn E. Tuma, one of the nation’s leading legal experts on the Computer Fraud and Abuse Act (CFAA), says that attacks against embedded systems like printers can expose companies to much larger security risks, including a costly CFAA breach that requires public disclosure and a risk of regulatory penalties.Read More
When business travelers are on the go and need to print, a trip to the business center at a hotel, airport or convention center can be a lifesaver. This week, however, security blogger Brian Krebs published a memo from the U.S. Secret Service warning that criminals have been compromising hotel business center PCs with keystroke-logging malware, in a bid to steal personal and financial data from guests.Read More
Back in 1748, in his essay Advice to a Young Tradesman, Benjamin Franklin wrote:
“Remember that time is money. He that can earn ten shillings a day by his labour, and goes abroad, or sits idle one half of that day, though he spends but sixpence during his diversion or idleness, it ought not to be reckoned the only expence; he hath really spent or thrown away five shillings besides.”Read More
Are employees more productive using their own smartphone or tablet as part of a BYOD program? That’s long been a tricky question for CIOs, but CIO.com staff writer Tom Kaneshige answered the question in an article published over the weekend.
Quoting from a survey by BMC Software, Kaneshige says that the average BYOD-carrying employee works an extra two hours and sends 20 more emails every day. One out of three BYOD employees checks work email before the official start of their work day, between 6 a.m. and 7 a.m. Three out of four IT managers claim, "BYOD is a big productivity boost."Read More
Is your EMM solution complete? It’s not a question most IT managers really think much about. After all, enterprise mobility management (EMM) is defined as an all-encompassing approach to securing and enabling business workers' use of smartphones and tablets.
A strong EMM strategy will also help mobile end users work more productively by providing them new tools to do their jobs on smartphones and tablets. Enterprise app stores or other application delivery and deployment technologies are common components of EMM, as are identity management systems to control user access to these new tools.Read More
Every year, tech venture capital leader Kleiner Perkins Caulfield Byers (KPCB) publishes a report on Internet trends. And every year that report serves as a snapshot that developers, investors and CIOs use to help them plan ahead and check their understanding of important trends.Read More
According to Gartner, nearly 2.2 billion smartphones and tablets will be sold to end users in 2014. And it’s a good bet that most of them will wind up housing at least some data that belongs to the device owner’s employer.
[This post was written by Breezy's founding CEO, Jared Hansen.] Breezy got its start as the world's first true mobile printing app for BlackBerry. When I first started working on it, I called the project "bbprint", and it took several months to come up with a name that wasn't BlackBerry-specific.
Earlier this month, Google announced a new Chrome browser add-on dubbed End-to-End, which is designed to make email more secure. While some media reports trumpeted the move as an attempt to “fly in the face of the National Security Agency”, most reported it simply as an added layer of security for messages delivered via the Internet.