Choose The Right Smartphone Encryption

Choose The Right Smartphone Encryption

Most companies now have smartphones, if not as standard, for a select group of key employees. These devices are now capable of calculating numbers in spreadsheets, email and storage of commercially sensitive documents. As workforces become ever more reliant on remote...
Detecting Mobile Malware

Detecting Mobile Malware

Since the breakthrough in botnets specifically for mobile began in 2011, they have been a major headache, and cause for concern, for all those involved with the security of mobile devices. While early generations of botnets have been in operation on computers and...
Handling Self Service IT

Handling Self Service IT

For end-users these days, it’s a wondrous world. IT departments are rolling out tools to enable these end-users access the data and services they require; from employee benefits accounts, to once inaccessible corporate data stacks. Before handing over the reins...
Encrypting Smartphone Calls

Encrypting Smartphone Calls

Many companies, looking to cut the cost of their employee’s tech use, now operate a bring your own device (BYOD) policy. This has obvious benefits, not least of which is the reduction in capital cost of buying smartphone technology for their employees. However,...
Hackers Focus on Cryptoransom Malware

Hackers Focus on Cryptoransom Malware

The fast moving world of information security faces a new challenge as attackers are increasingly focusing on mobile users, embracing cryptoransomware in particular. This makes a change from the years before 2014 as mobile attacks increase exponentially alongside...
Self Service Revolution in Healthcare

Self Service Revolution in Healthcare

Waiting weeks or months for proper analysis of data is a problem for any business. In that time, trends may have come and gone, sales lost, or customers overlooked. Keeping up with the flood of data means IT departments have been overwhelmed with requests and there...