16 11, 2016
  • cyber security

Cybersecurity Tips for Employees Series (Week 7) – The Value of an MSP in ensuring Employee Cybersecurity

Partnering with a trusted Managed Services Provider (MSP) that understands IT security can bolster your cybersecurity defences.

This is especially true when it comes to end user error, as all the tools and solutions in the world won’t protect your business from every attack.

Human error is still one of the highest risk factors in a business, and many employees grow complacent at some point as they fail to follow best practices.

2 11, 2016
  • cyber security

Cybersecurity Tips for Employees Series (Week 5): Mobile Security

Mobile Security

Mobile security is increasingly becoming a big concern as more and more companies adopt Bring Your Own Device (BYOD) environments, which allow end users to connect to corporate networks through their own (often multiple) devices. Even in cases where a business does not offer BYOD, end users often find a way to log onto

3 08, 2016
  • endpoint security management

Endpoint Security Management: Securing Today’s Perimeterless Networks

Growing mobile device usage requires comprehensive endpoint device security management.

As the variety of ways workers connect together and to the internet to work expands, so do the steps needed to be taken to ensure those connections are secure and not a risk to your business.

Employees are increasingly using mobile devices to connect to the corporate network which puts pressure on your IT to provide a method for endpoint security and device management that makes sense to the mobile worker and your business.

27 07, 2016
  • Bring Your Own Device (BYOD) The Pros and Cons

Bring Your Own Device (BYOD) Policy: The Pros and Cons

Bring Your Own Device (BYOD) The Pros and Cons There are many benefits of Bring Your Own Device (BYOD). These include reduced cost of equipment to the business, increased employee satisfaction and efficiencies, less office space required (should the employee be truly mobile) as well as a decrease in the burden on IT support staff as the employee maintains their own equipment.

Unfortunately, with these benefits, comes risk. BYOD policies potentially expose security vulnerabilities as employee-owned devices are not directly managed or maintained by IT staff or beholden to the corporate antivirus solutions.

17 07, 2016
  • Mobile Device Management

What to look for in an MDM solution?

Mobile Device Management If you’ve made the decision to implement an Mobile Device Management (MDM) solution, you will no doubt be overloaded with the amount of options that are currently out there on the market. While many features will vary, there are certain criteria that are essential in your selection process