Mobile infections shot up 96%: What it means for you

With at least one smart device in nearly every user’s arsenal – and many holding corporate information – mobile infections pose a bigger threat to your security than ever.

3 reasons users break BYOD policies (and what you can do to stop it)

Hopefully, your organization is among the many that have implemented BYOD policies explaining what users can and can’t do with corporate info on mobile devices. And more than likely, you’ve had your fair share of of users who have broken the policy. 

BYOD offers promise, but takes its toll on IT departments

Mobile support is becoming more and more common. But while companies see the benefits, IT is often left struggling to support this influx of devices. 

Is this a good thing? iPhones will soon tell users if you’re monitoring them

There are a few ways to interpret a recent report about the newest iOS version: One is that it’ll give users a constant reminder to be careful on company devices. Another is that it’ll freak them. Big time. 

Mac is making its way into more corporate offices

While Apple has always lagged behind competitors in enterprise use, it has seen an “unprecedented” increase in corporate use recently, according to a recent survey. The question is: Is this growth sustainable? 

Somehow, BYOD is still stumping IT pros

Recent findings from Dell and Dimensional Research show that while IT has made serious headway with Bring Your Own Device (BYOD) plans, some basic functionality and security issues are keeping it from becoming a resource users are comfortable with. 

Malicious code sneaks through App Store’s defenses

Usually when you hear about malicious applications, it’s a case of hackers evading Google Play’s defenses. But it was recently discovered thousands of App Store apps have potential security flaws. 

10 keys for a BYOD policy that won’t get you sued

At first, BYOD was something a few brave companies were giving a shot. Then it became a nice way to get users off corporate devices. Now company phones are rare and BYOD is becoming the norm. What’s the next hurdle for Bring Your Own Device? Keeping it from becoming a legal liability. 

Companies still aren’t ready for the risks of a mobile workforce

Believe it or not, it’s been almost ten years since the iPhone’s introduction. While that wasn’t the first smartphone by any means, it marked a serious change in the IT landscape: Suddenly, mobile devices were everywhere, and company data was on them. 

Gone, but not forgotten: Wiping Android devices doesn’t always work

One of the best tools for making sure a lost or stolen phone doesn’t become a data breach nightmare is to wipe its memory. It also helps make sure that devices you’re done with don’t contain sensitive information.