2 11, 2016

Cybersecurity Tips for Employees Series (Week 5): Mobile Security

2019-08-05T13:22:30+08:00

Mobile Security

Mobile security is increasingly becoming a big concern as more and more companies adopt Bring Your Own Device (BYOD) environments, which allow end users to connect to corporate networks through their own (often multiple) devices. Even in cases where a business does not offer BYOD, end users often find a way to log onto

Cybersecurity Tips for Employees Series (Week 5): Mobile Security2019-08-05T13:22:30+08:00
9 09, 2016

VDI – What you need to know

2019-08-05T13:22:37+08:00

Desktops computers or colloquially FAT Clients are an awful, wasteful way to enable workforce productivity. With failing disk drives, space consumption, security defeating features, and the never ending upgrades to cater for the endless specification creep of software, people with larger desktop fleets have had no other choice but to look

VDI – What you need to know2019-08-05T13:22:37+08:00
3 08, 2016

Endpoint Security Management: Securing Today’s Perimeterless Networks

2019-08-05T13:22:38+08:00

Growing mobile device usage requires comprehensive endpoint device security management.

As the variety of ways workers connect together and to the internet to work expands, so do the steps needed to be taken to ensure those connections are secure and not a risk to your business.

Employees are increasingly using mobile

Endpoint Security Management: Securing Today’s Perimeterless Networks2019-08-05T13:22:38+08:00
27 07, 2016

Bring Your Own Device (BYOD) Policy: The Pros and Cons

2019-08-05T13:22:38+08:00

There are many benefits of Bring Your Own Device (BYOD). These include reduced cost of equipment to the business, increased employee satisfaction and efficiencies, less office space required (should the employee be truly mobile) as well as a decrease in the burden on IT support staff as the employee maintains

Bring Your Own Device (BYOD) Policy: The Pros and Cons2019-08-05T13:22:38+08:00