search

Five practical tips to protect your business from mobile phishing attacks

With the increase in remote working, there’s been a sharp rise in mobile phishing attacks. You don’t have to be a data scientist to correlate the relationship between the two. Even if people in your workplace are returning to the office for at least some part of the working week, large numbers of employees will continue to work remotely for some time to come.

 

Topics: Security Management

Working from home the new normal for some

As we said in our article at the end of June, love it or hate it, remote working is here to stay. The coronavirus pandemic has acted as a catalyst rapidly forcing many companies to embrace a work-from-home model. With no miracle cure for COVID-19 on the near horizon, for many employees, working from home is likely to be the new standard.

Topics: Management Unified Communications Connectivity

3 critical factors to improve your mobility strategy

Intelligence, Security, and management are three critical factors associated with developing a successful Enterprise Mobility strategy.


Topics: Management Intelligence Lifecycle

Businesses are spending 15% of telecoms expenses on inactive devices

What would you say if we told you your business is probably wasting upwards of 15% of its telecoms spending on inactive devices? Or your company’s mobile phone usage is putting your business at risk? That’s what we’re finding from the mid-sized organisations we’ve reviewed as part of our Fast Start program.

Topics: Management Lifecycle

How to justify a TEM solution to your CEO

In today’s enterprise, complex mobile-based technology infrastructure coupled with the growth of enterprise mobility means burgeoning telecom expense management costs are a fact of life. To drive efficiencies of telecom costs, assets and services implementing a TEM solution is now more important than ever.

Topics: Management Lifecycle