TechDay New Zealand - Aotearoa's technology news network

Bring Your Own Device (BYOD) stories - Page 9

One of the more obvious acronyms you’ll encounter in the information technology, BYOD is exactly what it appears to be: your own devices used at home, but brought into the office and used for work. BYOD is a big deal in the technology space because it requires careful management, with issues including keeping personal information and apps separate from professional ones, securing company data, and establishing how support is provided. With the proliferation of smartphones, tablets and personally-owned laptops and other devices, BYOD is a practical reality for almost every organisation today.
Story image
CrowdStrike: Best practices for mobile device security
Tue, 28th May 2019
#
endpoint protection
#
ai security
#
edr
As mobile use surges in both personal and corporate spheres, CrowdStrike offers best practices for safeguarding mobile devices against cyber threats.
Story image
Businesses failing to secure BYOD - Bitglass
Fri, 3rd May 2019
#
dlp
#
ueba
#
cybersecurity
Report finds that 74% of organisations allow BYOD but nearly half lack clear security policies and best practices.
Story image
Sophos offering mobile device management with Microsoft Intune integration
Tue, 2nd Apr 2019
#
firewalls
#
network infrastructure
#
endpoint protection
Running on Microsoft Azure, the Sophos integration will enable IT administrators to configure individual device usage policies within Microsoft Intune.
Story image
BYOD can be secure with the right measures
Mon, 25th Mar 2019
#
endpoint protection
#
mfa
#
dlp
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Story image
Achieving uncompromising security without compromising privacy
Fri, 1st Feb 2019
#
endpoint protection
#
casb
#
edr
Navigating the BYOD era, companies must balance robust security measures with user privacy, steering away from invasive MDM to agentless solutions.
Story image
How to combat human error in cyber risks
Thu, 29th Nov 2018
#
endpoint protection
#
biometrics
#
edr
Over a third of Aussie firms suffer data breaches due to staff errors, underlining dire need for cybersecurity training.
Story image
Why endpoint security is critical in a post-perimeter era
Thu, 22nd Nov 2018
#
malware
#
endpoint protection
#
casb
Traditional perimeter-based security strategies – once the backbone of enterprise security – simply no longer apply.
Story image
Three ways to achieve data security whilst enabling BYOD
Mon, 19th Nov 2018
#
dlp
#
personal computing devices
#
byod
Balancing data security with a BYOD policy is challenging. Here are three strategies, from MDM to agentless mobile security, to achieve it.
Story image
UEM solutions may be the key to mobile security
Mon, 10th Sep 2018
#
mdm
#
wireless networks
#
personal computing devices
Microsoft’s rise in Gartner’s UEM rankings highlights their innovative multi-layered mobile security approach, surpassing traditional MDM solutions.
Story image
Is BYOD an expensive mistake for your business?
Wed, 22nd Aug 2018
#
personal computing devices
#
byod
#
mobility
Although BYOD can seem like a cost-effective mobility solution, experts warn it might backfire due to security, productivity, and cost concerns.
Story image
Apple ecosystem management systems on the rise in ANZ
Tue, 7th Aug 2018
#
mdm
#
personal computing devices
#
apple
Jamf opens a Sydney office to support its expanding Apple ecosystem management service in ANZ, aiming to enhance customer experience and training capabilities.
Story image
Venafi announces new enterprise endpoint management solution
Wed, 4th Jul 2018
#
endpoint protection
#
encryption
#
edr
Organisations must provide mobile devices of all types with secure machine identities that support authentication, encryption and decryption.
Story image
Westcon-Comstor first local distie for Bitglass
Mon, 25th Jun 2018
#
partner programmes
#
casb
#
healthtech
Bitglass partners with Westcon-Comstor as their first New Zealand distributor, boosting expansion in Asia Pacific and strengthening cloud security solutions.
Story image
How offering IT ‘self-service’ can help create a more attractive workplace
Fri, 22nd Jun 2018
#
mdm
#
personal computing devices
#
byod
How technology is offered in the workplace can have an instrumental impact on how an organisation is perceived and whether people will want to stay.
Story image
Unisys extends cyber protection to IoT and connected devices
Wed, 18th Apr 2018
#
mdm
#
iot
#
healthtech
Unisys has moved to include Internet of Things (IoT) devices and other internet connected equipment in the new version of its Unisys Stealth.
Story image
57% of enterprises suspect their mobile workers have been hacked
Wed, 28th Mar 2018
#
vpns
#
cybersecurity
#
personal computing devices
iPass has released the results of a survey that sought to determine how companies are dealing with the trade-off between security and mobile workers.
Story image
Is there an answer for soaring numbers of cyberbullying cases?
Fri, 16th Mar 2018
#
mdm
#
iot
#
smart home
In the wake of the mass digitisation taking homes by storm, cyberbullying and online harassment has accelerated 60 percent with no signs of slowing.
Story image
Why a secure perimeter is no longer enough protection for your IT infrastructure
Mon, 12th Mar 2018
#
mfa
#
mdm
#
personal computing devices
Digital identity is used as the key method of protecting digital assets regardless of their location or how they are being accessed.
Story image
How your smart home gadgets are putting you at risk – and what you can do about it
Mon, 5th Mar 2018
#
ddos
#
mdm
#
smart home
You wouldn’t openly leave your front door and your wallet open for burglars, so why would you leave your entire home unsecured from cyber threats?.
Story image
Achieving better security for BYOD workplaces
Fri, 2nd Mar 2018
#
casb
#
dlp
#
personal computing devices
The rise of BYOD lets employees work from anywhere on personal devices but challenges IT to secure diverse endpoints, pushing for data-centric solutions.