1,005 posts found for "security"

Mitigate Data Security Risks With 2X MDM

With the great hype surrounding the use of personal devices for work, 2013 was regarded as the year of BYOD (bring your own device). This concept has strongly moved into 2014 and it seems that it is here to stay. Today, many companies are making allowances for BYOD networks in their operational...
BYOD Security Concerns

BYOD Security Concerns

BYOD Security (Bring Your Own Device), often referred to as BYOT (Bring Your Own Technology), is a security policy that permits workers to use their own equipment, like computers, tablet devices, or smartphones, while at work to access proprietary data and company-owned...

iPhone Security Vulnerability

You may have heard the news last month regarding an iPhone security exploit on the new iOS 6.1. The iPhone security glitch made it possible to bypass the iPhone’s passcode security and access to your locked iPhone’s contacts, voicemails, photos and more. Apple have said they are aware...

Dealing with Mobile Security Concerns

According to a survey concluded at the end of 2012, the top security concern worldwide across all sized businesses is mobile security. It’s no surprise – the use of mobile devices is rising, and most businesses are embracing the many advantages they bring. BYOD programs are increasing, and...