MobileIron: Corporate IT policy and mobile device security are mismatched

Computer Weekly

MobileIron report identifies a gap between security policy and the actual deployment of that policy on mobile devices

Setting Mobile Policies for ERP

IT Toolbox

As mobile devices proliferate companies using ERP need to deal with them. Whether you want to have a BYOD environment, or the company issues tablets or smartphones to some employees, mobile devices are out there and you have to adapt to them. This means setting and enforcing clear policies on what is acceptable use in your ERP environment.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. Lack of clarity in InfoSec policies can lead to catastrophic damages which cannot be recovered. So an organization makes different strategies in implementing a security policy successfully. Security policies of all companies are not same, but the key motive behind them is to protect assets.

5 Ways Mobile Device Management Drives BYOD Policy

IT Toolbox

To help them achieve this goal, software emerged on the market called mobile device management (MDM). The history of Bring Your Own Device (BYOD) has been a rocky one. Since the beginning, IT departments and business owners have tried to understand the idea and learn how to make it positive for the business instead of a headache. Rather than review specific MDM tools, however, this article

The Importance of an Online Encryption Policy

CTOvision

This quote summarizes the importance of online encryption policy and hands-on implementation within an organization. Once your computer or mobile device is connected to the Internet, there’s no guarantee of protection and safety of your personal files, whether you’re using it as a consumer or a corporate user. Through an online encryption policy, you can mitigate the risks and avoid these cases, whether you’re a profit or a non-profit organization.

Creating End-User Mobility Policies

Data Center Knowledge

While the Age of Bring-Your-Own-Device has arrived, the implementation is where the underlying challenges start. With all of these devices, how does an IT department manage the data being delivered and how can they continue to provide a powerful end-user experience? Bill Kleyman of MTM Technologies. Industry Perspectives

Square announces permanent work-from-home policy

The Verge

The indefinite extension of the company’s remote work policy echoes a similar announcement from Twitter last week. The new policy will apply to teams that are able to do their jobs remotely. Employees at the mobile payments company have been working remotely since early March.

Five Real-World Tips for Creating Corporate Cloud Policies

Data Center Knowledge

It's time to make some new policies. Cloud Computing Enterprise Mobility cloudAre you creating a new cloud initiative? Want to start migrating users, apps. and workloads? Read More.

Real World Mobility – Filling the Gaps

Eric D. Brown

I just finished reading through the Dimension Data Secure Enterprise Mobility Report.The report is a nice report on how modern organizations are thinking about and approaching strategic planning with mobility, BYOD and security in mind. Sponsored by Dimension Data.

Mobile 235

How to Deliver Workplace Safety Training on Mobile Devices

Kitaboo

In such a situation, where the training is compulsory, but you can’t ensure 100% uptake, you can deliver it on mobile devices. Most industries have now started using mobile devices for delivery of induction training, product training and other skill development modules.

How the CIO Can Establish a BYOD Usage Policy

CIO Dashboard

If you’re grappling with putting policies and procedures in place to manage the consumer-driven transition to a bring-your-own-device workplace (BYOD), don’t worry. Do I have the right to wipe the data with a mobile management system that I require employees to install?

How CIOs Deal With Mobile Disruption

The Accidental Successful CIO

Mobile disruptions can happen at any time Image Credit. As CIO, because of the importance of information technology, you need to get ready to deal with the disruptions that that arrival of even more mobile technology is going to create.

Mobile 194

How the CIO can Sleuth Mobile Systems

CIO Dashboard

The responsibility of conducting mobile forensic investigations in the workplace should fall in the lap of the Chief Information Security Officer (CISO). Fetching data from mobile devices is fraught with challenges not found in the more mature realm of personal computers.

Mobile 100

5 Mobile Applications for Drug Testing

Galido

Information Technology Blog - - 5 Mobile Applications for Drug Testing - Information Technology Blog. Either way, you may want to try these five apps and mobile technologies that are the best if you want quick, convenient and noninvasive methods for doing a drug test. Mobile

How to Build a Mobile-Ready Training Program for Pharmaceutical Industry

Kitaboo

Why Should Pharmaceutical Companies Leverage a Mobile-Based Training Model? On the other hand, creating a mobile-ready training program for pharmaceutical company and employees will give them access to training materials at any time, via any device and multiple number of times. Here is How to Empower Frontline Employees with Mobile Training. In this blog, we will take a look at how pharmaceutical companies can make mobile-ready training programs for their employees.

9 July 2015 DoD CIO Mobility Industry Day

CTOvision

Another event we would like to bring to your attention is the AFCEA coordinated DoD CIO Mobility Industry day of 9 July 2015. Mobility is not just a major trend for DoD, but is a major driver of future mission functionality and is also posing very unique security challenges for the department. The DoD CIO seeks to inform industry of DoD plans and to solicit assistance in accelerating delivery of mobility solutions to best meet mission objectives.

News on @Fixmo and Defense Information Systems Agency Mobility Management for U.S. Department of Defense

CTOvision

Defense Information Systems Agency Mobility Management for U.S. This program has been considered a core foundation to enabling the secure compliant use of a diverse selection of mobile devices, operating systems and applications by DoD personnel for years to come.

Mobile 277

Apple’s App Store policies are bad, but its interpretation and enforcement are worse

The Verge

Tom Warren: The first investigation will probe whether Apple has broken EU competition rules with its App Store policies, following complaints by Spotify and Rakuten over Apple’s 30-percent cut on subscriptions and sales of ebooks through its App Store. “We

All You Need to Know About VMI for Mobile Apps

Galido

VMI stands for Virtual Mobile Infrastructure and basically, it provides end users with a highly effective and an efficient way to have access to delicate mobile applications and information without much hassle. It allows end users to have the organic and unadulterated mobile experience.

Experts Tackle Enterprise Mobility at Latest B2B IT Forum

The Investing Edge

Our panel of experts, led by moderator Chris Hazelton of 451 Research , provided a compelling and informative discussion on the shift to mobile within organizations of all sizes. Despite the monumental traffic on Tuesday night (where did that come from?!?),

B2B 132

Microsoft Intune Policies For Samsung Knox Enabled Devices

CanITPro

While delivering last week’s CANITPRO Business Mobility Camp in Calgary, a question was brought forth in regards to what specific policies can be enforced on A Samsung KNOX enabled device via Microsoft Intune.

Google highlights hotels that cater to COVID-19 responders

Venture Beast

Google is introducing a new feature that shows which hotels have special rates and policies for frontline workers dealing with the COVID-19 crisis. Business Commerce Entrepreneur Marketing Mobile category-/Travel/Hotels & Accommodations Covid-19 Google google maps hotels

Hotels 110

Privacy groups complain to FTC about WhatsApp policy changes

Network World

have complained to the Federal Trade Commission that changes last week in WhatsApp’s terms and privacy policy breaks its previous promise that user data collected would not be used or disclosed for marketing purposes. WhatsApp said last week it will be sharing some account information of users with Facebook and its companies, including the mobile phone numbers they verified when they registered with WhatsApp. Privacy groups in the U.S.

5 mobile app development trends to watch in 2019

mrc's Cup of Joe Blog

Summary: The demand for enterprise mobile apps is growing. In this article, we explore 5 enterprise mobile app trends you can’t ignore this year. We’ve only seen incremental advancements in mobile technology and mobile app development over the past few years.

Privacy groups complain to FTC over Google’s 'deceptive' policy change

Network World

Privacy groups have complained to the Federal Trade Commission that Google is encroaching on user privacy through a policy change in June that allows it to combine personally-identifiable information with browsing data collected by its DoubleClick digital advertising service.

BYOD and its Impact on Enterprise Content Delivery

Kitaboo

Enterprise training is slowly coming out of the traditional classroom model into being a web-based and a mobile-driven training model, where employees can now be trained on any device at any time. The global mobile data traffic is projected to increase nearly sevenfold between 2016 and 2021.

Mobile device security: A new frontier for hackers

Cloud Musings

However, the majority of mobile device users have yet to be sensitized to their personal and corporate security risks. Staples For example, a security study found that 69 percent of users store sensitive personal information on their mobile devices. Encrypt mobile device data.

Mobile 140

The new class of CEOs at Verizon, AT&T and T-Mobile

The Verge

Over the past decade, the leaders of Verizon, T-Mobile, and AT&T oversaw a shift from simplistic feature phones into the era of smartphones and streaming. This is among Vestberg’s top priorities as T-Mobile and Sprint try to get the upper hand on 5G availability. T-Mobile.

Guided Hands-on Lab: BYOD Mobile Device Management with.

IT Pros Rock!

Guided Hands-on Lab: BYOD Mobile Device Management with System Center 2012 SP1 and Windows Intune. Guided Hands-on Lab: BYOD Mobile Device Management with System Center 2012 SP1 and Windows Intune. Guided Hands-on Lab: BYOD Mobile Device Management with System Center 2012 SP1 and Windows Intune. How do we support IT applications, data and security policies in this new BYOD age? Create an APN certificate for mobile device management. Sign in. IT Pros ROCK!

Have You Correctly Estimated Your Company’s Demand For Mobile?

The Accidental Successful CIO

First it was mobile phones, now its tablets… Image Credit: Nana B Agyei. Before then, mobile phones were just that – phones. What might surprise a number of people with the CIO job is that there is one department in the company in which the mobile properties of an iPad tablet most appealed to. What the sales teams are going to be looking to the IT department to do is to set polices regarding how the devices can be used and also implementing mobile device management systems.

Mobile 109

USMC and DoD Rapid Reaction Technology Office Seeks Info On Six Categories of Technology: Please review and engage

CTOvision

Friends at the Potomac Institute for Policy Studies recently brought this to our attention and since a high number of our readers live their lives studying or working with advanced technologies we wanted to get this to you right away. Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of. By Bob Gourley.

Study 235

How to maintain data and document security with a mobile workforce

Network World

Pragmatic approach Image by Thinkstock Data and document security with today’s mobile workforce can be a difficult challenge.

BYOD: Is This A Good Thing Or A Bad Thing For CIOs?

The Accidental Successful CIO

Consumer electronic prices have gotten so low that the company’s employees can now purchase mobile phones and powerful tablets that only a few years ago the company would have had to provide them with. Sure BYOD seems like a good idea, but is there a down side?

Young Turks in the Enterprise

The Investing Edge

Ascent’s portfolio company Verivo , for example, supports BYOD by enabling businesses to build, manage, and deploy mobile apps across heterogeneous platforms.

Google, like Samsung, is eavesdropping on your private conversations

CTOvision

Samsung Flaw Lets Hacker Easily Take Control of Your Galaxy Mobile Remotely (thehackernews.com). Samsung Tweaks Television Policy Over Privacy Concerns (bits.blogs.nytimes.com). If you use Google Chrome , you could be subject to eavesdropping by Google.

Google 424

Boeing Black Smartphone: Security, modularity and productivity

CTOvision

Security, modularity and productivity delivered – all in one trusted mobile device. Through embedded hardware security features, software policy configurability and physical modularity, Boeing Black gives customers a trusted, more flexible and productive solution.

Cognitio Is Sponsoring The CTOvision Synergy Conference

CTOvision

Invited speakers and attendees include policy-makers, architects, program managers and influencers in the federal government and the most forward thinking engineers, architects and innovators in the American technology ecosystem. By Katie Kennedy.

Determining Who Should Be in Charge of Cyber Security

CTOvision

If a business has adopted a BYOD policy, every worker in the company can use their personal mobile devices for their jobs. Mobile Strategy mobile SecuritySecurity has quickly transformed into a major issue for most businesses.

Ascent Index: BYOD (June 6 – June 20)

The Investing Edge

One reason for the uptick could be the latest Fortinet study , which found that more than half of workers in their twenties believe it is their “right” rather than a privilege to use their own mobile devices at work.

B2B 99

Mobilizing the Enterprise - A Screw's Loose

A Screw's Loose

Mobilizing the Enterprise. I spend a lot of time talking to people about the mobile enterprise. Sometimes it’s people I work with, or friends who work at other companies, over twitter, or just people who reach out to ask a question or two about mobilizing their company. A lot of these questions tend to focus on BYOD (Bring your own device) initiatives and other want to talk about how to do apps on mobile devices. There has to be a reason to go mobile. Mobile.

Basecamp’s protest of Apple’s policies is already benefiting other developers

The Verge

That’s one reason I suspect Basecamp’s public protest of Apple and its App Store policies has gotten so much traction. The company said the tweet violated its policy against abusive behavior. Illustration by Alex Castro / The Verge.

Simplifying Mobile App Data Management with DynamoDB's Fine-Grained Access Control

All Things Distributed

Speed of development, scalability, and simplicity of management are among the critical needs of mobile developers. As I have mentioned previously , companies like Crittercism and Dropcam have already built exciting mobile businesses leveraging DynamoDB.

7 Solutions to Enhance Engagement in Your Compliance Training

Kitaboo

Regulatory compliance refers to the goals that organizations aim to achieve in their efforts to ensure that they are aware and well-equipped to meet the relevant laws, regulations, policies and protocols of the countries with which they are conducting their business activities.