Tag "BYOD"

Back to homepage
Industry Insights

Five Factors Predicting The Future Of MacOS Management And Security

Going into 2020, CISOs’ sense of urgency for managing their fleets of Android, Apple iOS & macOS, Windows Phone and Windows 10 devices all from an integrated Unified Endpoint Management

Software

Why 2020 should be the year of public sector cybersecurity training

Public sector organisations cannot risk a cyberattack, and training is one of the best ways to prevent this. In 2020, organisations across the U.K. public sector should reprioritise their security

Hardware/Network Software

Shadow IT Is The Cybersecurity Threat That Keeps Giving All Year Long

More than 5,000 personal devices connect to enterprise networks every day with little or no endpoint security enabled in one of every three companies in the U.S., U.K., and Germany.

Hardware/Network

BYOD security challenges leave companies at risk

Organizations aren’t moving quickly enough on cybersecurity threats linked to the drive toward using personal mobile devices in the workplace, warns a QUT privacy researcher. Click here to view original webpage at

Software

In A BYOD World, Everybody Needs Cybersecurity Chops

Technology alone won’t fix the security woes that have been rampaging through the connected business world. What is needed is the full engagement of the workforce. Carl Cadregari, executive vice

Software

Preventing insider threats, data loss and damage through zero trust

With the proliferation of mobile devices and BYOD, ubiquitous and always available internet connectivity and the widespread use of private, public and hybrid cloud solutions, eventually all organizations will be

Hardware/Network

Businesses are ditching their VPNs

VPN attacks and related breaches are on the rise, forcing organisations to adopt a new method of securing their networks and cloud apps. Because of this, according to cloud security

Mobile

Microsoft Intune can now block unauthorized BYOD hardware

Microsoft has integrated third-party mobile threat defense (MTD) software with its Intune unified endpoint management (UEM) platform, enabling corporate systems to detect when an employee’s unenrolled, smartphone or tablet has an app

Expert Articles Hardware/Network

Edge Computing and Virtual Desktop Infrastructure (VDI): A Perfect Pairing

By Alan Conboy – Office of the CTO at Scale Computing, Virtual desktop infrastructure (VDI), a virtualization technology that creates fully personalized, individual desktop virtual machines with user profile control

Mobile

How mobile use cases in financial services are affecting security

Financial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “​Mobile Security in the Financial Services​,” includes analysis of six months of security data from 225 financial