Breezy, the mobile printing leader, announced today that it has joined the MaaS360 WorkPlace Partner Program. Breezy is now available in the MaaS360 Market, and will leverage the MaaS360 WorkPlace SDK to enable enterprise-grade security controls for protection of corporate data.Read More
So an attacker hacks into your printer. That’s no big deal, right? Printers don’t have much in the way of memory, so how much data can really be at risk if someone hacks into one?
Dallas attorney Shawn E. Tuma, one of the nation’s leading legal experts on the Computer Fraud and Abuse Act (CFAA), says that attacks against embedded systems like printers can expose companies to much larger security risks, including a costly CFAA breach that requires public disclosure and a risk of regulatory penalties.Read More
When business travelers are on the go and need to print, a trip to the business center at a hotel, airport or convention center can be a lifesaver. This week, however, security blogger Brian Krebs published a memo from the U.S. Secret Service warning that criminals have been compromising hotel business center PCs with keystroke-logging malware, in a bid to steal personal and financial data from guests.Read More
Back in 1748, in his essay Advice to a Young Tradesman, Benjamin Franklin wrote:
“Remember that time is money. He that can earn ten shillings a day by his labour, and goes abroad, or sits idle one half of that day, though he spends but sixpence during his diversion or idleness, it ought not to be reckoned the only expence; he hath really spent or thrown away five shillings besides.”Read More
Is your EMM solution complete? It’s not a question most IT managers really think much about. After all, enterprise mobility management (EMM) is defined as an all-encompassing approach to securing and enabling business workers' use of smartphones and tablets.
A strong EMM strategy will also help mobile end users work more productively by providing them new tools to do their jobs on smartphones and tablets. Enterprise app stores or other application delivery and deployment technologies are common components of EMM, as are identity management systems to control user access to these new tools.Read More
Whether you work in a small business, a growing mid-size business, or a large enterprise, protecting your business from cyber threats can seem like a daunting task. A smaller business may not need the robust protections required for an enterprise, but regardless of the size of your business there are five basic steps that are absolutely essential.
(Last week, we published the first part of a two-part look at how pre-surveys and user audits help IT departments create a framework that will keep a BYOD policy from devolving into a chaotic, unsecured “do your own thing” (DYOT) environment. This is the second part of that article.)
For many IT managers, BYOD (bring your own device) model can devolve into a chaotic DYOT (do your own thing) model, where users actively circumvent IT policies and apps in favor of unmanaged consumer apps, unmanaged personal cloud storage, or even devices that are encrypted to block company oversight and reporting. What could cause that nightmarish scenario?
As you work to enable mobile productivity, have you thought about what happens to the paper-based portions of your workflow? For many companies, unsecured apps downloaded by employees seeking to print from their mobile devices can pose a significant mobile security issue.
Breezy has been named as one of CIOReview's Top 10 Enterprise Print Management Solution Providers for 2014. The annual list of companies was selected by a panel of experts and members of CIOReview's editorial board to recognize and promote technology entrepreneurship and value-add solutions to the enterprise printing market.