Blog Banner

Breezy Blog - Mobile Printing Experts

Can Printers Put Your Network at Risk of a CFAA Breach?

Posted on Thu, Jul 17, 2014

So an attacker hacks into your printer. That’s no big deal, right? Printers don’t have much in the way of memory, so how much data can really be at risk if someone hacks into one?

Dallas attorney Shawn E. Tuma, one of the nation’s leading legal experts on the Computer Fraud and Abuse Act (CFAA), says that attacks against embedded systems like printers can expose companies to much larger security risks, including a costly CFAA breach that requires public disclosure and a risk of regulatory penalties.

Read More

Tags: secure mobile printing, compliance, CFAA, preventing a data breach

Keyloggers & Other Business Center Security Worries

Posted on Tue, Jul 15, 2014

When business travelers are on the go and need to print, a trip to the business center at a hotel, airport or convention center can be a lifesaver. This week, however, security blogger Brian Krebs published a memo from the U.S. Secret Service warning that criminals have been compromising hotel business center PCs with keystroke-logging malware, in a bid to steal personal and financial data from guests.

Read More

Tags: secure mobile printing, mobile security, Breezy Partner Network

If Time = Money, What’s the Cost of Mobile Printing Limits?

Posted on Fri, Jul 11, 2014

Secure Mobile Printing GraphicBack in 1748, in his essay Advice to a Young Tradesman, Benjamin Franklin wrote:

“Remember that time is money. He that can earn ten shillings a day by his labour, and goes abroad, or sits idle one half of that day, though he spends but sixpence during his diversion or idleness, it ought not to be reckoned the only expence; he hath really spent or thrown away five shillings besides.”

Read More

Tags: secure mobile printing, IT, mobile printing, IT security, cloud printing, BYOD Printing

Does BYOD Make Employees More Productive? Maybe

Posted on Tue, Jul 08, 2014

Are employees more productive using their own smartphone or tablet as part of a BYOD program? That’s long been a tricky question for CIOs, but CIO.com staff writer Tom Kaneshige answered the question in an article published over the weekend.

Quoting from a survey by BMC Software, Kaneshige says that the average BYOD-carrying employee works an extra two hours and sends 20 more emails every day. One out of three BYOD employees checks work email before the official start of their work day, between 6 a.m. and 7 a.m. Three out of four IT managers claim, "BYOD is a big productivity boost."

Read More

Tags: BYOD

Top Mobile Security Solutions Lock Down Data Not User Access

Posted on Thu, Jul 03, 2014

Is your EMM solution complete? It’s not a question most IT managers really think much about. After all, enterprise mobility management (EMM) is defined as an all-encompassing approach to securing and enabling business workers' use of smartphones and tablets.

A strong EMM strategy will also help mobile end users work more productively by providing them new tools to do their jobs on smartphones and tablets. Enterprise app stores or other application delivery and deployment technologies are common components of EMM, as are identity management systems to control user access to these new tools.

Read More

Tags: secure mobile printing, on-device encryption, BYOD, enterprise mobility, EMM

Mobile Security Threats Grow with Mobile Device Penetration

Posted on Tue, Jul 01, 2014

Every year, tech venture capital leader Kleiner Perkins Caulfield Byers (KPCB) publishes a report on Internet trends. And every year that report serves as a snapshot that developers, investors and CIOs use to help them plan ahead and check their understanding of important trends.

Read More

Tags: mobile security, enterprise mobility

Mobile App Mistakes May Account for 75% of Mobile Security Breaches

Posted on Tue, Jun 24, 2014

According to Gartner, nearly 2.2 billion smartphones and tablets will be sold to end users in 2014. And it’s a good bet that most of them will wind up housing at least some data that belongs to the device owner’s employer.

Read More

Tags: Android, iPad, mobile security, iPhone, mobile device management, MDM, Gartner, Android security, iPhone security, iPad security

It's Time: Goodbye, BlackBerry.

Posted on Mon, Jun 23, 2014

[This post was written by Breezy's founding CEO, Jared Hansen.] Breezy got its start as the world's first true mobile printing app for BlackBerry. When I first started working on it, I called the project "bbprint", and it took several months to come up with a name that wasn't BlackBerry-specific.

Read More

Tags: BlackBerry, RIM, sunset, CEO letter, focus, execution

What Google’s End-to-End Encryption Move Means for Mobile Security

Posted on Fri, Jun 20, 2014

Earlier this month, Google announced a new Chrome browser add-on dubbed End-to-End, which is designed to make email more secure. While some media reports trumpeted the move as an attempt to “fly in the face of the National Security Agency”, most reported it simply as an added layer of security for messages delivered via the Internet.

Read More

Tags: mobile security, Breezy, encryption, Google End-to-End encryption

Mobile Security Lessons IT Can Learn from FIFA's World Cup

Posted on Tue, Jun 17, 2014

Football – not the American-style game played with a pointed ball by men in helmets and pads, but the global game played with a round ball by men in shorts --  is suddenly a hot topic in U.S. IT circles.

Read More

Tags: IT, mobile security, IT security, BYOD, 2014 World Cup

Email Subscription

Follow Us

Browse by Tag