You have employees. They bring smartphones to work. All is fine, right? Wrong. First of all, the second an employee brings a personal mobile device to work, you can bet on a fusion of personal and ...
As mobile workforce manager at Spirit Airlines, Terrell Bramwell does the kind of work that almost everyone depends on but few people ever get to see. At last count, Bramwell says, Spirit employed ...
Mobile technology can be an excellent tool for productivity and convenience, but it also poses security threats. So be aware and watchful. Smartphones are all around us, and people use... Mobile ...
When you think about device security, we often think mainly of computer workstations. It's easy to overlook security practices on our mobile devices, but mobile devices require even more care and ...
"It's about protecting devices, the data on those devices and ensuring that the applications being used are not infected with malware," said John Dasher, senior director of mobile security at McAfee, ...
Your mobile device is an essential part of your academic and professional life, but it is also a prime target for cyber threats. Protecting your phone, tablet, or laptop from security risks helps ...
Mobile devices are being used in the healthcare space in increasing numbers because the benefits of using mobile devices are many — the emergence of mobile applications allows physicians to easily ...
Mobile device management creates a standard setting for corporate owned mobiles, tracks their location, and enforces security. Systems can also manage BYOD. Find out the best MDM system. Businesses ...
In the past six months a disturbing trend has emerged involving the theft of laptops containing sensitive personal information — most recently from the home of a U.S. Department of Veterans Affairs ...
From coffee shops to planes, trains, and cruise ships, we've become accustomed to having ready access to the Internet just about anywhere. The problem is, it's easy to forget how vulnerable that makes ...
Are smartphones ever entirely secure? It depends on one’s definition of “secure,” particularly when dealing with corporate environments. Most companies with bring-your-own-device policies install apps ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results