Is Your Mobile Device Strategy at Odds with Employee Expectations?

employee mobile device strategy
  • October 6, 2016
  • Print This Post
An effective device management strategy promises a highly desirable ROI trifecta of reduced costs, improved processes, and increased productivity—all of which are essential if your company is to remain competitive. Identifying the best approach, however, can be tricky, even for seasoned business and technology managers, as security threats escalate regularly

Mobile Devices: Magnets for Security Breaches

  • August 11, 2016
  • Print This Post
Researchers in an IDG/Lookout survey of 100 business executives were surprised that 74 percent of the leaders polled said they had experienced a mobile-related security breach. Maybe the revelation shouldn’t have been so surprising, given that 82 percent admitted that ‘most’ of their corporate data was accessible via mobile devices.

Tech Wearables in the Workplace: 3 Measures to Reduce Your Cyber Security Risks

Unrecognizable woman holding wearable gadget. New technologies. Wireless tools. Future communications and social media concept.
  • August 9, 2016
  • Print This Post
One of the items on our list of “5 Cyber Security Threats for SMBs to Watch in 2016” was “Wearable Tech.” Better known by the nickname tech wearables, this category of mobile devices includes smartwatches, fitness bands and other pieces of connected hardware that monitor our every move and send

Security Experts Debate: How Vulnerable Are Your Mobile Devices?

  • November 17, 2015
  • Print This Post
Researchers predict that by the end of 2015 eight of every 10 mobile subscribers will own at least one smartphone. And, as we have reported in earlier posts this year (“Make Mobile Users the Frontline of Your Cybersecurity Corps”) this rising tide of mobility presents cybersecurity challenges for small to

Business Continuity Basics: 8 Good Habits for Road Warriors

  • August 25, 2015
  • Print This Post
Every time you or one of your employees slings a laptop bag over a shoulder and hits the road for a business trip or remote working session, your company tempts disruption. Why? Because study after study confirms the human element continues as one of the largest risk factors involved in

5 Keys to Working Securely Anywhere

ThinkstockPhotos-469551661
  • July 2, 2015
  • Print This Post
In its infographic “2015 Threats Predictions,” cybersecurity software maker McAfee Labs reported that instances of mobile malware – i.e., malicious software that is designed specifically to target mobile devices – grew more than 100% during 2014. In the third quarter alone, the total number of mobile malware samples exceeded 5

Craft Your Mobile Policy Like the Big Guys

  • June 23, 2015
  • Print This Post
Mobile devices – laptops, smartphones, tablets – are a permanent part of the business landscape, and will continue to be in one form or another for the foreseeable future, especially given the rise of Millennials in the U.S. workforce. Consider these stats about smartphones alone as evidence of the larger

Make Mobile Users the Frontline of Your Cybersecurity Corps

ThinkstockPhotos-160810576
  • June 16, 2015
  • Print This Post
A recent report by the digital research company comScore revealed that nearly 77% of the U.S. mobile subscriber population now owns a smartphone. Researchers expect that number to climb to 80% or more by year-end. And whether those smartphones are employee- or company-owned, used in the office or on the

6 Must-Have Items for Your Written BYOD Policy

ThinkstockPhotos-453000229
  • June 4, 2015
  • Print This Post
Over the last year, we’ve written a lot about “bring your own device” (BYOD) options for mobile communications tools in the workplace. We have given you the pros and cons of implementing BYOD policies and discussed the risks involved with letting employees use their own mobile phones and tablets to

Five Technologies Changing Mobile Management

ThinkstockPhotos-484224025
  • April 30, 2015
  • Print This Post
In this don’t-look-down-or-you’ll-miss-it era of mobile technology advancement, being on top of emerging mobile trends – and, more importantly, being prepared for them – is key to staying competitive in the modern business world. Here, we arm you with five hot mobile technology developments that will soon be changing the
Need Help with your IT?

Find a Location
Near You.

Gain
weekly
insight

into the evolving world of IT for business.
Subscribe now.

Follow Us
Friend me on FacebookFollow me on TwitterFollow my company on LinkedInRSS Feed

Follow us on Twitter

About

ITinflections is a blog that covers a wide range of technology-based articles IT in the workplace, focusing on small- to medium-sized businesses.

If you’re looking to improve your company’s productivity through the effective use of technology, enjoy ITinflections, the blog about technology for business.