Mitigate Data Security Risks With 2X MDM
With the great hype surrounding the use of personal devices for work, 2013 was regarded as the year of BYOD (bring your own device). This concept has strongly moved into 2014 and it seems that it is here to stay. Today, many companies are making allowances for BYOD networks in their operational...
Windows XP Flaws, Companies Alone Facing the Security Flaws E6-E11
Microsoft revealed a vulnerability in all versions of Internet Explorer that is being used in “limited, targeted attacks.”
Microsoft recently revealed a vulnerability in all versions of Internet Explorer from 6 through 11. The company has yet to announce the patch for this...
Living in a high mobile age, smartphones have now become our very own personal handheld computers. These devices are so precious to us that we can’t live without them can we? Why do we love them so? Well, we can take them everywhere,...
10-Time Microsoft MVP Brien Posey Provides His Considerations For User Device Security
User Device Security Considerations
— Brought to you by 2X Cloud Computing guest blogger Brien M. Posey —
In a virtual desktop environment, it is usually the virtual desktops themselves that received the most attention. Administrators work tirelessly to ensure that virtual desktops are...
10-Time Microsoft MVP Brien Posey Discusses the Use of Virtual Desktops as a Data Access Security Solution
Using Virtual Desktops as a Data Access Security Solution
— Brought to you by 2X Cloud Computing guest blogger Brien M. Posey —
In the not too distant past, the general assumption was that most corporate applications would be accessed from within the network perimeter. Today this simply...
BYOD Security (Bring Your Own Device), often referred to as BYOT (Bring Your Own Technology), is a security policy that permits workers to use their own equipment, like computers, tablet devices, or smartphones, while at work to access proprietary data and company-owned...
iPhone Security Vulnerability
You may have heard the news last month regarding an iPhone security exploit on the new iOS 6.1. The iPhone security glitch made it possible to bypass the iPhone’s passcode security and access to your locked iPhone’s contacts, voicemails, photos and more. Apple have said they are aware...
Dealing with Mobile Security Concerns
According to a survey concluded at the end of 2012, the top security concern worldwide across all sized businesses is mobile security. It’s no surprise – the use of mobile devices is rising, and most businesses are embracing the many advantages they bring. BYOD programs are increasing, and...