Four Trends that Continue to Shape SMBs

The economic challenges of the last several years caused many SMBs to move cautiously with technology investments. At the same time, small business owners are trying to find ways to compete more effectively, cut costs, and adapt to the changing markets. Technology offers potential ways for SMBs to achieve business goals. With tighter budgets and […]

The Challenge of Guarding Ideas

The challenge of keeping valuable secrets confidential is often held in tension with the challenge of being a robust company with opportunity to discover and grow. Some companies lock-down information so tightly it can inhibit workflow, cause unnecessary duplication, and even generate a culture of suspicion. Other businesses may err the other way and lose valuable information that can hurt […]

Protecting Against Insider Threats to Your Organization

How do you guard against employee theft of data without creating an environment of suspicion? By developing and administering an internal security policy, you can keep internal security at a professional level. Here are a few highlights in beginning to consider a plan: Understanding Your Data Monitoring Network Activity Utilizing Data Protection Tools for Various […]

Plugging BYOD Security Holes

Sophos released a disturbing report that indicates 42% of lost mobile devices in the UK had no security measures in place.[1] Surveying of 1008 consumers in Great Britian, Sophos asked about security measures by mobile device users aged between 16 and 64. According to James Lyne, director of technology strategy at Sophos, “The widespread lack […]

Developing a BYOD Infrastructure

Bring Your Own Device (BYOD) will continue to grow and be a major challenge/opportunity for businesses in the years to come. The advantages of BYOD are numerous including the following: Reduced costs and responsibility for securing and maintaining smartphones and service plans. Simplified telecomputing for traveling or working from home. Employees can access and respond […]

BYOD Policy Essentials

Over the past several years, many companies, educational facilities, healthcare organizations and others have opened their doors to a wide-range of personal devices. BYOD or Bring Your Own Device represents a shift in IT perception that asks “How can we support personal devices?” rather than, “How can we block all all personal devices?” This shift […]

“Managed Diversity” and the Challenge of Supporting Mobility

Information technology advisory firm Gartner challenges IT groups to put priority focus on developing and supporting a mobile device management (MDM) policy. “The era of fully supporting company-owned devices is giving way to an era of managed diversity in which tiered support for employee-owned, consumer-class devices is the norm,” said Terrence Cosgrove, research director at […]