by Shlom | Jun 12, 2017 | Uncategorized
Most companies now have smartphones, if not as standard, for a select group of key employees. These devices are now capable of calculating numbers in spreadsheets, email and storage of commercially sensitive documents. As workforces become ever more reliant on remote...
by Shlom | Jun 12, 2017 | Uncategorized
Since the breakthrough in botnets specifically for mobile began in 2011, they have been a major headache, and cause for concern, for all those involved with the security of mobile devices. While early generations of botnets have been in operation on computers and...
by Shlom | Jun 12, 2017 | Uncategorized
For end-users these days, it’s a wondrous world. IT departments are rolling out tools to enable these end-users access the data and services they require; from employee benefits accounts, to once inaccessible corporate data stacks. Before handing over the reins...
by Shlom | Jun 12, 2017 | Uncategorized
Many companies, looking to cut the cost of their employee’s tech use, now operate a bring your own device (BYOD) policy. This has obvious benefits, not least of which is the reduction in capital cost of buying smartphone technology for their employees. However,...
by Shlom | Jun 12, 2017 | Uncategorized
The fast moving world of information security faces a new challenge as attackers are increasingly focusing on mobile users, embracing cryptoransomware in particular. This makes a change from the years before 2014 as mobile attacks increase exponentially alongside...
by Shlom | Jun 12, 2017 | Uncategorized
Waiting weeks or months for proper analysis of data is a problem for any business. In that time, trends may have come and gone, sales lost, or customers overlooked. Keeping up with the flood of data means IT departments have been overwhelmed with requests and there...