Blog Banner

Breezy Blog - Mobile Printing Experts

Will 2015 be the Year IT Gets BYOD Right?

Posted on Thu, Dec 18, 2014

According to the Darkreading security blog, 2014 was a year when IT got BYOD wrong. In an article based on the results from a Bitdefender survey Darkreading said the numbers prove that we’re doing BYOD wrong.

Read More

Tags: secure mobile printing, IT security, BYOD, mobile device security,, IT security planning

Combating (Hidden) Employee Behavior that Puts Data at Risk

Posted on Thu, Dec 11, 2014

In a recent guest post on the Business2Community website, Absolute Software VP Stephen Midgley wrote that while mobile devices have created a productive work environment where nearly everything is instant, collaborative and shareable, employees are also putting valuable company data at risk by “getting up to mischief.”

Read More

Tags: BYOD, data security, mobile device security,

Securing 3rd Party Mobile Apps: A New IT Challenge

Posted on Wed, Sep 24, 2014

Everyone in IT knows about BYOD – bring your own (mobile) device. But does your company have a policy and procedure in place to deal with BYOA? Employee use of third-party cloud application services and consumer applications in the workplace is one of the biggest challenges facing IT right now.

According to a recent report from Gartner, this is trend represents such a challenge because more than 75% of mobile apps fail basic security tests. Employees download from app stores and use mobile apps that can access enterprise assets or perform business functions, and many of these apps have little or no security assurances. Well-meaning employees can easily expose themselves to cyberattacks and violations of enterprise security policies.

Read More

Tags: secure mobile printing, BYOD, enterprise mobility, EMM, mobile app development, mobile apps, BYOA,, mobile app security,, mobild device security,

The BYOD War is Over & Users Won: Now What?

Posted on Wed, Sep 03, 2014

IDC says that 1.2 billion workers were using mobile devices at the end of 2013. If there was a battle about whether or not mobile devices were welcome in the workplace, the war is over and users won. In fact, IDC says that the adoption of mobile technology is moving at unprecedented speeds, putting the needs and experience of end users at the forefront of any company's mobile enterprise strategy.

Read More

Tags: mobile security, mobile device management, BYOD, Gartner, Radicati,, IDC

Does BYOD Make Employees More Productive? Maybe

Posted on Tue, Jul 08, 2014

Are employees more productive using their own smartphone or tablet as part of a BYOD program? That’s long been a tricky question for CIOs, but CIO.com staff writer Tom Kaneshige answered the question in an article published over the weekend.

Quoting from a survey by BMC Software, Kaneshige says that the average BYOD-carrying employee works an extra two hours and sends 20 more emails every day. One out of three BYOD employees checks work email before the official start of their work day, between 6 a.m. and 7 a.m. Three out of four IT managers claim, "BYOD is a big productivity boost."

Read More

Tags: BYOD

Top Mobile Security Solutions Lock Down Data Not User Access

Posted on Thu, Jul 03, 2014

Is your EMM solution complete? It’s not a question most IT managers really think much about. After all, enterprise mobility management (EMM) is defined as an all-encompassing approach to securing and enabling business workers' use of smartphones and tablets.

A strong EMM strategy will also help mobile end users work more productively by providing them new tools to do their jobs on smartphones and tablets. Enterprise app stores or other application delivery and deployment technologies are common components of EMM, as are identity management systems to control user access to these new tools.

Read More

Tags: secure mobile printing, on-device encryption, BYOD, enterprise mobility, EMM

Mobile Security Lessons IT Can Learn from FIFA's World Cup

Posted on Tue, Jun 17, 2014

Football – not the American-style game played with a pointed ball by men in helmets and pads, but the global game played with a round ball by men in shorts --  is suddenly a hot topic in U.S. IT circles.

Read More

Tags: IT, mobile security, IT security, BYOD, 2014 World Cup

Avoiding Mobile Printing Problems: 5 Factors to Consider

Posted on Tue, May 20, 2014

(Last week, we published the first part of a two-part look at how pre-surveys and user audits help IT departments create a framework that will keep a BYOD policy from devolving into a chaotic, unsecured “do your own thing” (DYOT) environment. This is the second part of that article.)

Read More

Tags: secure mobile printing, mobile printing on android, enterprise mobile printing, mobile printing on iPad, mobile device management, BYOD, enterprise mobility

Making the Green(back) Case for Managed, Secure Mobile Printing

Posted on Wed, Apr 30, 2014

Whether they’re going green, or just trying to avoid going over budget due to spiraling printing costs, a growing number of corporations and educational institutions around the globe are adopting print management solutions to help control excess printing costs.

Read More

Tags: secure mobile printing, printing from iPad, mobile printing, mobile printing for the enterprise, mobile device management, BYOD, mobile printing in K-12

4 Questions IT Doesn’t Like to Ask About Mobile Printing

Posted on Wed, Apr 09, 2014

Whether it’s a school, small business, or large enterprise tablet rollout, the subject of mobile printing usually comes up during the first few weeks. The questions usually show up at the help desk, in the form of users who fully expected to be able to print from the new iPad or Android tablet just as easily as they did from their laptop or desktop PC.

Read More

Tags: secure mobile printing, IT, mobile security, mobile printing on android, mobile device productivity, mobile printing on iPad, BYOD, enterprise mobility, man-in-the-middle attacks

Email Subscription

Follow Us

Browse by Tag