BYOD

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce augue justo, viverra at luctus vitae, dapibus eu odio. Morbi vestibulum orci neque, vulputate pharetra purus fringilla in.

Decentralization of IT Tech Increases Security Risk
Decentralization of IT Tech Increases Security Risk

IT is becoming increasingly decentralized, with purchasing and management decisions being made at the business level. As cloud computing continues to move technology beyond IT, data is increasingly at risk. According to a new study by VMware, 69% of respondents believe IT has become increasingly decentralized over the past 3 years and 57% agree that this decentralization has resulted in the purchasing of non-secure solutions. “The IT Archipelago: Fragmentation...

READ MORE
Empowering Employees to Minimize Shadow IT Risks
Empowering Employees to Minimize Shadow IT Risks

Personal devices and cloud services are used without the governance of IT. Unmonitored app use is rampant, and files are emailed or uploaded to cloud services. The list of bad Shadow IT behaviours is long.

READ MORE
Endpoint Visibility Lacking for BYOD
Endpoint Visibility Lacking for BYOD

If 72% of organizations are supporting BYOD for all or some of their employees, you would expect a similar figure for controlling data security on those devices? Sadly, this ideal still remains elusive. A new report suggests that while BYOD is nearing universal acceptance, basic precautions such as encryption, remote wipe or mobile application management, to name a few, remain elusive for many organizations. And yet, there are signs...

READ MORE