search

Mobile Data Security Central to Healthcare Recordkeeping Transformation

A major transformation is coming to NSW Health’s recordkeeping in the form of the Single Digital Patient Record (SDPR). As the largest transformation in Australian healthcare history, it involves a massive shift from a fragmented and disconnected databases to a single, unified electronic medical record.

Topics: Security Healthcare

Mobile Threat Detection and How It Protects Businesses

When you’re competing in a mobile-centric business environment, safeguarding your organisation's data requires that you go beyond the traditional network perimeters. Mobile Threat Detection (MTD) is a critical cybersecurity strategy designed to identify, analyse and mitigate threats targeting mobile devices in real time. With the increasing reliance on smartphones and tablets for business operations, MTD ensures that your mobile endpoints remain secure against evolving cyber threats. In this article, imei explores the many ways in which MTD protects businesses across the world. 

Topics: Security

Switching on the new era of business connectivity solutions

In a world of increasingly digital and distributed business operations, old thinking on business connectivity solutions and treating networking and security as separate systems no longer fits with the high-performance connectivity companies require across locations, applications, and devices. These days turning on a secure and fast connection between your offices, tactical pop-up sites, and disparate locations is a basic business requirement. 

Topics: Security Network

5 ways to shore up mobile enterprise security

Cybercrime is a highly competitive, billion-dollar business. With so much of today’s business taking place online and on mobile, this means your devices are under attack and potentially offer attackers a fast route to undermine mobile enterprise security.

Topics: Security

Data silos and security risks from unauthorised apps

In many businesses, there’s little visibility into the unauthorised apps employees download and use to get their work done and it’s becoming a major threat to business security. Employees circumvent using the company-approved tools that they find frustrating or outdated to help them work faster and more efficient and avoid switching between a large number of authorised apps.

Topics: Security