4 Ways to Keep Your Tech Happy and Healthy

Just like your car, your home, and everything else of importance in your life, maintenance is key for keeping things running as smoothly as possible. But what about your technology? Computers, tablets, smartphones, smartwatches, and other pieces of tech are expensive and require intentional upkeep — just like your other assets. Today, we’re bringing you […]

5 Levels of Mobile Security

Mobile security forms a key component of a business’s overall security strategy. The use of mobile devices impacts all size businesses from small to large, highlighting the need for a robust mobile security solution. Earlier this year, Gartner Research released a report listing five levels of mobile security that can help business conduct a assessment. […]

Mobile Devices from Strategy to Rollout

Implementing a mobile device management plan may seem overwhelming for some organizations. By breaking it down into smaller steps and considering key milestones within each step, the rollout can be more manageable. Once your organization mobile device implementation strategy (for tips see last post), you can begin engaging other members of the organization in a […]

Implementing a Mobile Device Policy

BYOD is fast becoming standard procedure for a range of public places like schools, businesses and even financial institutions. Medical facilities often struggle with implementing a mobile device policy. Some institutions have begun moving toward a policy, but then abandon the project in mid-stream because of the complexities, institutional politics, or other roadblocks. This doesn’t […]

Steps toward BYOD Defense

As Hospitals and Medical Facilities extend wireless access, it is essential to develop a robust BYOD defense plan. The public nature of hospitals and the large traffic of visitors, professionals and staff increases the risk of exposing data, violating patient privacy, and malicious attacks. The recent attacks at Target and Neiman Marcus expose the sophisticated […]

9 Out of 10 Mobile Apps are Vulnerable

According to a recent HP Research Report, nine out of 10 mobile apps have vulnerabilities that could pose a security threat. HP Security Research tested a representative sampling of mobile applications that included reviewing the security of 2,107 applications by 601 companies listed in the Fortune Global 2000.[1] About 97 percent of the mobile apps […]

Using Mobile Devices in SMBs

Even as businesses are still trying to figure out the BYOD challenge, employees are already using mobile devices in the workplace. The rapid rise of smartphones and tablets in the consumer market results in many employees and business owners using the same devices for the workplace. For many business, vital data as well as the […]

Beware of Zombie Phones

Zombie phones could be bleeding your bottom line. What is a zombie phone? A mobile device that you thought was turned off or turned over to the employee, but your company is still being billed. This is more common than you might think. After auditing the phone usage and phone billing for several companies, Pankaj Gupta, […]

BYOD and Containerization

Some organizations are turning to containerization as way of managing personal wireless devices that interact with company networks. When the University Hospitals Health System in Shaker Heights, Ohio introduced BYOD, they needed a robust MDM solution. Ryan Terry, division CIO and chief security officer, saw problems with many traditional MDM options because he felt that […]

5 Digital Technologies Shaping IT Priorities

Technology remains an underutilized key in realizing business goals, but with the growing embrace of digital technologies that could be changing. According to a recent Gartner survey of over 2000 CIOs, digital technologies are reaching a “tipping point” among business executives.[1] While Gartner reports that businesses realize on average about 43 percent of technology’s business […]