article thumbnail

Mobile Device Security Policy

Tech Republic Security

Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops.

Mobile 145
article thumbnail

Patch Management Policy

Tech Republic

Patching of operating systems, applications and devices is not usually ranked as a favorite endeavor of IT professionals, but it’s a critical process to ensure secure company operations as well as to reduce downtime and technical support headaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Software usage policy

Tech Republic

In order to maintain a consistent, predictable and supportable computing environment it is essential to establish a pre-defined set of software applications for use on workstations, laptops, mobile devices and servers. The post Software usage policy appeared first on TechRepublic. Company-approved.

article thumbnail

China Mobile customizes AN Methodology to slash 5G OpEx

TM Forum

Who: China Mobile and Huawei. If deployment of 5G can be considered a race, then China Mobile is arguably at the front of the pack. Consequently, a key objective for China Mobile’s 5G strategy is to find ways to reduce OpEx – but not, however, at the expense of quality of service (QoS.) The scale of the challenge.

Mobile 130
article thumbnail

Real World Mobility – Filling the Gaps

Eric D. Brown

I just finished reading through the Dimension Data Secure Enterprise Mobility Report.The report is a nice report on how modern organizations are thinking about and approaching strategic planning with mobility, BYOD and security in mind. Only 29% have ave tested how well their applications work on mobile devices.

Mobile 221
article thumbnail

The Importance of an Online Encryption Policy

CTOvision

This quote summarizes the importance of online encryption policy and hands-on implementation within an organization. Once your computer or mobile device is connected to the Internet, there’s no guarantee of protection and safety of your personal files, whether you’re using it as a consumer or a corporate user. Government institutions.

Policies 283
article thumbnail

5 Mobile Applications for Drug Testing

Galido

Information Technology Blog - - 5 Mobile Applications for Drug Testing - Information Technology Blog. Either way, you may want to try these five apps and mobile technologies that are the best if you want quick, convenient and noninvasive methods for doing a drug test. EyeScan Drug & Alcohol Impairment Detection Service App.

Mobile 81