search

Remote working: secure sensitive data

As we discussed in a recent on blog on remote working, for many enterprises, the COVID-19 outbreak has triggered an emergency response to establish and enable a remote workforce. Businesses everywhere are supporting remote working practices, yet in many cases, without laying strong foundations for robust data security.

Topics: Security Management Lifecycle Remote Working

GEMA organisation a ‘Visionary’ in 2020 Gartner Magic Quadrant

imei’s international partner GEMA – based in Switzerland and providing Enterprise Mobility services in over 100 countries – is seen as a ‘Visionary’ in the latest Gartner Magic Quadrant for Managed Mobility Services (MMS). 

Topics: Security Management Intelligence Lifecycle

Remote working: 3 keys to establishing a secure and productive work environment

Remote working has been accelerating across many different professions and industries for quite some time. The coronavirus pandemic has, however, put the practice into sharp focus. With governments pressing for all those who can work from home to work from home, the COVID-19 outbreak has fast-tracked a trial run of remote working at an unprecedented scale.

Topics: Security Management Unified Communications Lifecycle Remote Working

How to solve technology challenges of remote working

As we discussed in our recent blog, modern technology has made remote working a real and workable possibility for many more Australians. It's become invaluable today in helping to cope with the COVID-19 emergency as many are mandated to work from home (WFH).

Topics: Security Management Intelligence Unified Communications Connectivity Lifecycle Network Remote Working

Combating data security risks with Artificial Intelligence

Formjacking – the practice of exploiting weak security in forms on websites –together with IoT strikes – cyberattacks on IoT devices – are emerging as the new normal in data security risks. Fast-overtaking traditional practices like phishing, these increasingly sophisticated techniques are being used to source valuable personal data.

Topics: Security