TECH SPOTLIGHT

5 Steps to BYOD

12/10/2012
Enabling even one or two of these five considerations will start you on the path to BYOD and allow your business to start reaping the benefits while maintaining security and creating a productive environment for employees.

Cybercriminals Going Mobile, Too

12/4/2012
Cybercriminals go where the data goes, and so mobile malware is a serious threat to the enterprise. Since July 2011 the number of mobile malware samples recorded by Symantec has increased about 55% per month. Here are 8 best practices for keeping threats at bay.

10 Factors for Choosing an MDM Solution

11/26/2012
You better consider your users expectations when approaching MDM. Without their buy-in, there won't be full adoption and the enterprise remains at risk.

5 Steps to a Winning Mobile Strategy

11/19/2012
Mobility is the most disruptive technology wave ever, but innovators who play offense instead of defense with their strategy approach, have been shown to increase revenue times two and profitability times three, while employee productivity increases by 50%.

Mobile Malware: 10 Tips for Prevention

11/13/2012
Mobile malware has been identified by CIOs as one of the top threats to enterprise data. Here are 10 ways your company can stop breaches and protect sensitive information.

5 Ways Windows 8 Will Affect the Enterprise

11/5/2012
Windows 8 is prompting a lot of questions for businesses. Should we adopt it for employees and phase out Windows 7 and XP? Should we take a wait-and-see approach? What about Windows 8 tablets and phones? Where are the apps?

5 Tech Trends for 2013

10/29/2012
What technologies will become obsolete? Which will grow? Five trends around BYOD, VPN, AaaS, big data and business intelligence run in a circle.

Dumb & Dumber: Worst Passwords Revealed

10/23/2012
A recent poll based on millions of stolen passwords posted online by hackers revealed that people are still using blatantly simple passwords and leaving businesses open to risk.

IT Challenged by Consumer Devices, Apps

10/16/2012
A recent study of consumerization of IT shows that a super-connected class of “mobile elite” workers is defying policies bringing any device and downloading any apps they want, creating risks along the way.
 |<  <  9 10 11 12 13 14 15 16 17 18  >  >| 

MOST READ STORIES

topics

Must See


FEATURED REPORT

Mobile Risk: Security Is Not a Game

IDC predicts 2 billion mobile devices will be shipped by 2017, while Gartner expects a 26 billion Internet of Things installed base (excluding smartphones and tablets) by 2020. With more devices, more machines, more connectivity comes more risk.