Bring Your Own Device (BYOD) stories - Page 9
One of the more obvious acronyms you’ll encounter in the information technology, BYOD is exactly what it appears to be: your own devices used at home, but brought into the office and used for work. BYOD is a big deal in the technology space because it requires careful management, with issues including keeping personal information and apps separate from professional ones, securing company data, and establishing how support is provided. With the proliferation of smartphones, tablets and personally-owned laptops and other devices, BYOD is a practical reality for almost every organisation today.
CrowdStrike: Best practices for mobile device security
Tue, 28th May 2019
#
endpoint protection
#
ai security
#
edr
As mobile use surges in both personal and corporate spheres, CrowdStrike offers best practices for safeguarding mobile devices against cyber threats.
Businesses failing to secure BYOD - Bitglass
Fri, 3rd May 2019
#
dlp
#
ueba
#
cybersecurity
Report finds that 74% of organisations allow BYOD but nearly half lack clear security policies and best practices.
Sophos offering mobile device management with Microsoft Intune integration
Tue, 2nd Apr 2019
#
firewalls
#
network infrastructure
#
endpoint protection
Running on Microsoft Azure, the Sophos integration will enable IT administrators to configure individual device usage policies within Microsoft Intune.
BYOD can be secure with the right measures
Mon, 25th Mar 2019
#
endpoint protection
#
mfa
#
dlp
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Achieving uncompromising security without compromising privacy
Fri, 1st Feb 2019
#
endpoint protection
#
casb
#
edr
Navigating the BYOD era, companies must balance robust security measures with user privacy, steering away from invasive MDM to agentless solutions.
How to combat human error in cyber risks
Thu, 29th Nov 2018
#
endpoint protection
#
biometrics
#
edr
Over a third of Aussie firms suffer data breaches due to staff errors, underlining dire need for cybersecurity training.
Why endpoint security is critical in a post-perimeter era
Thu, 22nd Nov 2018
#
malware
#
endpoint protection
#
casb
Traditional perimeter-based security strategies – once the backbone of enterprise security – simply no longer apply.
Three ways to achieve data security whilst enabling BYOD
Mon, 19th Nov 2018
#
dlp
#
personal computing devices
#
byod
Balancing data security with a BYOD policy is challenging. Here are three strategies, from MDM to agentless mobile security, to achieve it.
UEM solutions may be the key to mobile security
Mon, 10th Sep 2018
#
mdm
#
wireless networks
#
personal computing devices
Microsoft’s rise in Gartner’s UEM rankings highlights their innovative multi-layered mobile security approach, surpassing traditional MDM solutions.
Is BYOD an expensive mistake for your business?
Wed, 22nd Aug 2018
#
personal computing devices
#
byod
#
mobility
Although BYOD can seem like a cost-effective mobility solution, experts warn it might backfire due to security, productivity, and cost concerns.
Apple ecosystem management systems on the rise in ANZ
Tue, 7th Aug 2018
#
mdm
#
personal computing devices
#
apple
Jamf opens a Sydney office to support its expanding Apple ecosystem management service in ANZ, aiming to enhance customer experience and training capabilities.
Venafi announces new enterprise endpoint management solution
Wed, 4th Jul 2018
#
endpoint protection
#
encryption
#
edr
Organisations must provide mobile devices of all types with secure machine identities that support authentication, encryption and decryption.
Westcon-Comstor first local distie for Bitglass
Mon, 25th Jun 2018
#
partner programmes
#
casb
#
healthtech
Bitglass partners with Westcon-Comstor as their first New Zealand distributor, boosting expansion in Asia Pacific and strengthening cloud security solutions.
How offering IT ‘self-service’ can help create a more attractive workplace
Fri, 22nd Jun 2018
#
mdm
#
personal computing devices
#
byod
How technology is offered in the workplace can have an instrumental impact on how an organisation is perceived and whether people will want to stay.
Unisys extends cyber protection to IoT and connected devices
Wed, 18th Apr 2018
#
mdm
#
iot
#
healthtech
Unisys has moved to include Internet of Things (IoT) devices and other internet connected equipment in the new version of its Unisys Stealth.
57% of enterprises suspect their mobile workers have been hacked
Wed, 28th Mar 2018
#
vpns
#
cybersecurity
#
personal computing devices
iPass has released the results of a survey that sought to determine how companies are dealing with the trade-off between security and mobile workers.
Is there an answer for soaring numbers of cyberbullying cases?
Fri, 16th Mar 2018
#
mdm
#
iot
#
smart home
In the wake of the mass digitisation taking homes by storm, cyberbullying and online harassment has accelerated 60 percent with no signs of slowing.
Why a secure perimeter is no longer enough protection for your IT infrastructure
Mon, 12th Mar 2018
#
mfa
#
mdm
#
personal computing devices
Digital identity is used as the key method of protecting digital assets regardless of their location or how they are being accessed.
How your smart home gadgets are putting you at risk – and what you can do about it
Mon, 5th Mar 2018
#
ddos
#
mdm
#
smart home
You wouldn’t openly leave your front door and your wallet open for burglars, so why would you leave your entire home unsecured from cyber threats?.
Achieving better security for BYOD workplaces
Fri, 2nd Mar 2018
#
casb
#
dlp
#
personal computing devices
The rise of BYOD lets employees work from anywhere on personal devices but challenges IT to secure diverse endpoints, pushing for data-centric solutions.