search

Quora data security breach sounds alarm bells for all businesses

News last week of the Quora data security breach should serve as a wake-up call for all businesses. The widely used question-and-answer website was compromised by a malicious third party, impacting the account information of approximately 100 million users, including names, email addresses and encrypted passwords.

Topics: Security

How to resolve complex enterprise mobility management challenges

By 2025, IDC research predicts approximately 80 billion devices will be connected to the Internet. While I’m sure this comes as no surprise to anyone involved in enterprise mobility, the growing number of mobile devices, models, platforms and operating system versions is making this job harder to manage and creates ever more complex enterprise mobility management challenges.

Topics: Security Lifecycle

What you need to know about enterprise mobility TCO

In a very short space of time mobile has evolved from being another device for IT to support, to a new way of doing business. One that allows employees to do the same work they can do at their desk, from any location at any time. In the age of flexibility, employees are no longer shackled to their desks, but tethered to their mobile devices.

Topics: Management Security Lifecycle

Data Security Risk – Is your organisation vulnerable?

Australian businesses need to do more to stem data breaches

Overseas, the cost of the data breach at credit-reference agency Equifax is still rising, having already surpassed $439 million. With more costs to come, it’s highly likely this data breach will go down as the biggest in corporate history.

Topics: Security

Adopting UEM to create better mobile experiences for employees

In the world of enterprise mobility, there are acronyms aplenty. As we mentioned in an earlier post on the evolving needs of enterprise mobility, MDM, EMM, and MTM are but the tip of the iceberg. What we didn’t talk about in that story is the growing trend to UEM.

Topics: Management Security Intelligence Connectivity