Blog Banner

Breezy Blog - Mobile Printing Experts

Balancing Security & Privacy: How to Find the Right EMM Solution

Posted on Thu, May 14, 2015

Questions for CIOs & IT managers: Do you like your MDM or EMM solution? Do your executives and average employees like it? Or do they feel as if the solution you’ve deployed limits their choices, or makes day-to-day productivity harder?

Read More

Tags: MDM, BYOD, enterprise mobility, EMM, BYOD planning, COPE mobile device management

Texas BYOD Case’s Important Lessons for Employers & Employees

Posted on Thu, Apr 02, 2015

(Note: This article was written by Carl Spataro for the MobileIron blog, and was originally published on that blog on March 27, 2015. It is reprinted here with permission, because we think the information it contains is important for anyone concerned with issues of mobile device security, privacy, and management.)

A recent Texas case holds several simple but important lessons for implementing BYOD (mobile) policies for employers and employees alike. In Rajaee v Design Tech Homes et al., (Dist. Court, SD Texas, 2014), Saman Rajaee sued his employer, Design Tech Homes, for remote wiping personal data from his iPhone shortly after Rajaee gave notice of resignation. Rajaee cited violations of both federal and state law. Although the case was dismissed in federal court, the state court claims are still pending.

Read More

Tags: CFAA, MobileIron, BYOD, privacy, BYOD planning

Why Wearables May be a CIOs New Nightmare

Posted on Fri, Jan 09, 2015

It’s hardly news to CIOs and other IT professionals that smartphones are an integral part of everyday life for most working adults. But it was still a bit of a shock when Yahoo CEO Marissa Mayer stood up at the 2014 World Economic Forum in Davos to cite research that the average person now checks their smartphone a staggering 150 times a day.

Shortly thereafter, Salesforce CEO Marc Benioff showed the FitBit device he said had helped him lose 30 pounds, and noted that “I lost 30 pounds wearing the Fitbit; I do 10,000 steps a day. But here’s the amazing thing: Last week I got a call from Michael Dell. He asked if I’m feeling okay. ‘Why?’ I asked him. ‘I’m worried about you,’ he said, ‘because I’m your friend on the Fitbit network and noticed you hadn’t worked out in the last 3 days and wanted to make sure you’re okay,’ said Benioff.

Read More

Tags: BYOD, mobile device security,, wearables, wearable security

Will 2015 be the Year IT Gets BYOD Right?

Posted on Thu, Dec 18, 2014

According to the Darkreading security blog, 2014 was a year when IT got BYOD wrong. In an article based on the results from a Bitdefender survey Darkreading said the numbers prove that we’re doing BYOD wrong.

Read More

Tags: secure mobile printing, IT security, BYOD, mobile device security,, IT security planning

Combating (Hidden) Employee Behavior that Puts Data at Risk

Posted on Thu, Dec 11, 2014

In a recent guest post on the Business2Community website, Absolute Software VP Stephen Midgley wrote that while mobile devices have created a productive work environment where nearly everything is instant, collaborative and shareable, employees are also putting valuable company data at risk by “getting up to mischief.”

Read More

Tags: BYOD, data security, mobile device security,

Securing 3rd Party Mobile Apps: A New IT Challenge

Posted on Wed, Sep 24, 2014

Everyone in IT knows about BYOD – bring your own (mobile) device. But does your company have a policy and procedure in place to deal with BYOA? Employee use of third-party cloud application services and consumer applications in the workplace is one of the biggest challenges facing IT right now.

According to a recent report from Gartner, this is trend represents such a challenge because more than 75% of mobile apps fail basic security tests. Employees download from app stores and use mobile apps that can access enterprise assets or perform business functions, and many of these apps have little or no security assurances. Well-meaning employees can easily expose themselves to cyberattacks and violations of enterprise security policies.

Read More

Tags: secure mobile printing, BYOD, enterprise mobility, EMM, mobile app development, mobile apps, BYOA,, mobile app security,, mobild device security,

The BYOD War is Over & Users Won: Now What?

Posted on Wed, Sep 03, 2014

IDC says that 1.2 billion workers were using mobile devices at the end of 2013. If there was a battle about whether or not mobile devices were welcome in the workplace, the war is over and users won. In fact, IDC says that the adoption of mobile technology is moving at unprecedented speeds, putting the needs and experience of end users at the forefront of any company's mobile enterprise strategy.

Read More

Tags: mobile security, mobile device management, BYOD, Gartner, Radicati,, IDC

Does BYOD Make Employees More Productive? Maybe

Posted on Tue, Jul 08, 2014

Are employees more productive using their own smartphone or tablet as part of a BYOD program? That’s long been a tricky question for CIOs, but CIO.com staff writer Tom Kaneshige answered the question in an article published over the weekend.

Quoting from a survey by BMC Software, Kaneshige says that the average BYOD-carrying employee works an extra two hours and sends 20 more emails every day. One out of three BYOD employees checks work email before the official start of their work day, between 6 a.m. and 7 a.m. Three out of four IT managers claim, "BYOD is a big productivity boost."

Read More

Tags: BYOD

Top Mobile Security Solutions Lock Down Data Not User Access

Posted on Thu, Jul 03, 2014

Is your EMM solution complete? It’s not a question most IT managers really think much about. After all, enterprise mobility management (EMM) is defined as an all-encompassing approach to securing and enabling business workers' use of smartphones and tablets.

A strong EMM strategy will also help mobile end users work more productively by providing them new tools to do their jobs on smartphones and tablets. Enterprise app stores or other application delivery and deployment technologies are common components of EMM, as are identity management systems to control user access to these new tools.

Read More

Tags: secure mobile printing, on-device encryption, BYOD, enterprise mobility, EMM

Mobile Security Lessons IT Can Learn from FIFA's World Cup

Posted on Tue, Jun 17, 2014

Football – not the American-style game played with a pointed ball by men in helmets and pads, but the global game played with a round ball by men in shorts --  is suddenly a hot topic in U.S. IT circles.

Read More

Tags: IT, mobile security, IT security, BYOD, 2014 World Cup

Email Subscription

Follow Us

Browse by Tag