About Rocky Leong

This author has not yet written his bio.
Meanwhile let's just say that we are proud Rocky Leong contributed with 31 entries.

Entries by Rocky Leong

Coronavirus pandemic cause majority business to work from home.

Coronavirus pandemic cause majority business to work from home.

Getting risky with business.
Worker found embarrassed during work from home

DURING the coronavirus pandemic thousands of employees worldwide have to work from home.

Despite being able to work from the comfort of their own bed, some workers have faced issues in the process.
The isolated workers have taken to social media to share their biggest work from home fails during the COVID-19 crisis.

Here are some examples of what happen to workers who are working from home.

Whilst on camera for a team meeting via video call, Amanda Baker was left accidentally flashing her co-workers when Ryan walked in shot without any clothes on.

The employee […] Read more

Work From Home Video Chat Mistake Goes Viral

Work From Home Video Chat Mistake Goes Viral

As many of us are advised to work from home as the coronavirus pandemic.
In grips the globe, we are all finding ourselves having to adjust to the remote working life which may often involve online video conference calls with other key team members to ensure our work continues as efficiently as possible.

Of course, for many of us home working seemed like a great idea when we were stuck, cooped up in the office but when it boils down to it things can become well, a little distracting.

Procrastinators in particular may find it somewhat difficult to focus especially if they find […] Read more

Mobile device management and unified endpoint management

Mobile device management and unified endpoint management

Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management tools, one of the more difficult areas of cybersecurity is one of the most difficult areas of cybersecurity. The everchanging and growing threat landscape makes security difficult enough, while the lack of control surrounding mobile devices poses an additional challenge for security teams and administrators.

Mobile devices come in various shapes in sizes with equally varying operating systems, further complicating administrator management. For example, most OS allow for remote control capabilities, while Apple only permits remote view.

The most effective way […] Read more

How Enterprise Mobility Management(EMM) Helps Organisations in Data Security?

How Enterprise Mobility Management(EMM) Helps Organisations in Data Security?

Right now, enterprise mobility is the direction every corporate is working on. We have seen tremendous growth in cloud computing nowadays. Bringing your own device is getting more satisfaction and convenience in day to day work in office culture. The use of devices and apps loaded in them is also getting too much task for IT team.

Artificial Intelligence, Internet of Things (IOT) and Augmented Reality are the center of the talks for every meetings and conferences in 2018. Gaining in popularity in 2017, Enterprise Mobility is the priority for most of the corporates in 2018. No doubt, Enterprise Mobility has […] Read more

Managed Google Play: Reimagining enterprise application management – Part 2

Managed Google Play: Reimagining enterprise application management – Part 2

Approved apps only

Managed Google Play provides Enterprises or IT admins with an option to restrict the Play Store content. All the Google Play Store content is available in the managed Google Play but a stripped-down version of the Play Store, that suits the work environment is made available to the end-user. This helps the user focus only on work while using the work profile.

All this seems great, right? What if I tell you there is something better, that there is a way to do more with your managed Play Store?
To use managed Google Play the organization needs to be enrolled […] Read more

How To Ensure Hybrid Cloud Security with Secure Endpoints – Part 2

How To Ensure Hybrid Cloud Security with Secure Endpoints – Part 2

Here are four key endpoint security principles that are important to follow to ensure a strong endpoint security footprint across a hybrid cloud environment. As continuation of Part 2, here are the remaining 2 part.

1. Keep software and operating systems up-to-date

Keeping software and operating systems (OS) up-to-date is crucial to securing your organizations assets, especially since a considerable amount of cyberattacks happen due to outdated systems. Take, for example, the Baltimore ransomware attack and the Equifax data breach, which were both connected to an issue of software not being properly updated and patched.

To save time and costs, incorporate automation so […] Read more

How to Ensure Hybrid Cloud Security with Secure Endpoints – Part 1

How to Ensure Hybrid Cloud Security with Secure Endpoints – Part 1

For corporate IT departments and executives, the opportunity to deliver valuable digital services and data resources to internal business users and external customers has never been greater. Mobile devices, apps and high-speed connectivity have made it possible for widely distributed workers to gain easy access to information. Anywhere/anytime computing is a reality.

However, as businesses continue to transition to a hybrid cloud infrastructure, it’s critical for IT teams to evaluate their endpoint security strategies to make sure data is protected wherever it resides.

Here are four key endpoint security principles that are important to follow to ensure a strong endpoint security footprint […] Read more

4 Hands-Free Frontline Worker Technologies for the 2020s – Part 2

4 Hands-Free Frontline Worker Technologies for the 2020s – Part 2

Galvanic Skin Response Devices

Hands-free galvanic skin response devices allow workers to easily learn more about their own emotions and experiences via sweat monitoring, and to optionally have that information relayed to other staff. This way, if employees operating heavy machinery are in a severely agitated state, they can be encouraged to take care of themselves, rather than potentially endangering others.

Managers can utilize these devices for more than just monitoring. The Feel Emotion Sensor, for example, offers an enterprise program wherein each worker is encouraged to monitor and sustain their own mental health. This, in turn, can improve workers’ perception […] Read more

4 Hands-Free Frontline Worker Technologies for the 2020s – Part 1

4 Hands-Free Frontline Worker Technologies for the 2020s – Part 1

Frontline workers have a hard upper limit to the amount and pace of manual labor they can perform, given the occupational hazards inherent to warehouses, factories, and other frontline worker domains. If a worker’s job involves manually moving heavy objects, for example, demanding faster performance will eventually come at the unacceptable cost of compromising their safety.

Emerging frontline worker technologies have introduced a way to safely enhance worker productivity: allowing employees to perform an array of functions while their hands are full. This way, employees can work more efficiently, while still taking every precaution necessary to avoid injury.

Take a look at […] Read more