According to the Office of the Australian Information Commissioner, of the organisations reporting data breaches in the last quarter, more than one third of them could put those breaches down to failings in their security culture.
by Sid Vandervinne, on January 22, 2019
According to the Office of the Australian Information Commissioner, of the organisations reporting data breaches in the last quarter, more than one third of them could put those breaches down to failings in their security culture.
by Kieran Kirkpatrick, on December 10, 2018
News last week of the Quora data security breach should serve as a wake-up call for all businesses. The widely used question-and-answer website was compromised by a malicious third party, impacting the account information of approximately 100 million users, including names, email addresses and encrypted passwords.
by Tim Fussell, on December 3, 2018
By 2025, IDC research predicts approximately 80 billion devices will be connected to the Internet. While I’m sure this comes as no surprise to anyone involved in enterprise mobility, the growing number of mobile devices, models, platforms and operating system versions is making this job harder to manage and creates ever more complex enterprise mobility management challenges.
by Sid Vandervinne, on November 26, 2018
In a very short space of time mobile has evolved from being another device for IT to support, to a new way of doing business. One that allows employees to do the same work they can do at their desk, from any location at any time. In the age of flexibility, employees are no longer shackled to their desks, but tethered to their mobile devices.
by Sid Vandervinne, on November 6, 2018
Overseas, the cost of the data breach at credit-reference agency Equifax is still rising, having already surpassed $439 million. With more costs to come, it’s highly likely this data breach will go down as the biggest in corporate history.
Trends and Insights for Enterprise Mobility and Unified Communications Technology.
We cover topics including mobile security, cost-effective mobile device fleet management; leveraging existing investments; secure collaboration; mobile technology for healthcare; converged communications and more.