Forrester conducted a 3-years, risk-adjusted analysis of how organizations can benefit from using Knox Customization services to streamline device management.

Forrester conducted a 3-years, risk-adjusted analysis of how organizations can benefit from using Knox Customization services to streamline device management.

Forrester conducted a 3-years, risk-adjusted analysis of how organizations can benefit from using Knox Customization services to streamline device management.

The benefits amounted to an average of USD56,000, including USD41,000 for streamlined customization, configuration and deployment and USD15,000 for expedited re-enrollment for wiped devices.

This compares to costs of USD21,000. As a result, organizations can achieve a total ROI of 164% and see a payback time of just 2-months.

#KNOX #SYNDES

[…] Read more

The Star Newspaper reported that cyberattacks have increased dramatically over the past decade in Malaysia.

The Star Newspaper reported that cyberattacks have increased dramatically over the past decade in Malaysia.

The Star Newspaper reported that cyberattacks have increased dramatically over the past decade in Malaysia. In 2015 alone, CyberSecurity Malaysia received 9,915 reports on cyber-related incidents. This figure does not include cases that go unreported almost daily.

As Malaysia’s Internet penetration is expected to increase from 67% to 95% by 2020, more and more local organisations may be exposed to cyberattacks. The implications could be costly because this means businesses and organizations may be disrupted, or worser yet it could cost a lot of money.

Is your business secure? Get educated on the new world of enterprise mobility. Please call 03-22024190 or complete […] Read more

Did you know that one mobile phone is stolen every day in Malaysia?

Did you know that one mobile phone is stolen every day in Malaysia?

Did you know that one mobile phone is stolen every day in Malaysia? This shocking report was made by the Malaysian Telecommunications Dealers Organisation (MTDO). While the MTDO is taking pro-active measures to ensure that mobile phone users in the country have adequate insurance coverage for theft, businesses ought to be asking the question: what happens if sensitive information landed in the wrong hands?

This could go horribly wrong, especially if the people committing the crime are interested in more than just the phone. Thankfully, these days there are many options to secure your employees and your business.

Get educated on the […] Read more

Skysecure just released a study on cyber-crime concentrated in areas of high traffic, particularly the world’s top tourist destinations such as Times Square, Disneyland Parks and Union Station in Washington.

Skysecure just released a study on cyber-crime concentrated in areas of high traffic, particularly the world’s top tourist destinations such as Times Square, Disneyland Parks and Union Station in Washington.

Skysecure just released a study on cyber-crime concentrated in areas of high traffic, particularly the world’s top tourist destinations such as Times Square, Disneyland Parks and Union Station in Washington. The study revealed that SSL decryption was the most common type of attack at these hot destinations—with Android devices having a 2X higher monthly likelihood of a network exposure compared to iOS devices.

This translates to 25% of all mobile devices encountering a threat each month – a shocking figure in a time where mobile phones at the workplace is a commonplace.

Will your company’s cyber-security stand up to this reality? Get educated […] Read more

Will your company’s cyber-security plan stand up to this reality? Get educated on the new world of enterprise mobility.

Will your company’s cyber-security plan stand up to this reality? Get educated on the new world of enterprise mobility.

A study by Dr. Zinaida Benenson at Friedrich-Alexander University (FAU) of Erlangen-Nuremberg, Germany on mock phishing attacks yielded surprising results: it seems users are even more vulnerable to phishing attacks than we thought! It turned out that 78% of people claim to be aware of the risks of unknown links in emails. And yet they click anyway.

Those alarming statistics goes to show that despite educating people on phishing attacks, it is bound to happen anyway. These results could be devastating for a company of any size, because this means that it opens up doors for cyber attacks.

Will your company’s cyber-security […] Read more

Get educated on the new world of enterprise mobility.

Get educated on the new world of enterprise mobility.

A pwc reports that 32% of companies in their study were victims of cyber crime in 2016. It adds that most companies are still not adequately prepared for these attacks. In fact, only 37% of organisations have a cyber incident response plan.

The engagement of leadership is critical at this time of increasing cyber-crimes, but it seems that less than half of board members request information about their organisation’s state of cyber-readiness.

Will your company cyber-response plan stand up to reality? Get educated on the new world of enterprise mobility. Please call 03-22024190 or complete this form http://demo.syndes.biz/ to learn more.

[…] Read more

Digital traffic continues to increase as we sprint into the Zettabyte Era, with global annual totals projected to triple in three years. By 2020, wireless and mobile device traffic will account for two-thirds of total global IP traffic.

Digital traffic continues to increase as we sprint into the Zettabyte Era, with global annual totals projected to triple in three years. By 2020, wireless and mobile device traffic will account for two-thirds of total global IP traffic.

John Stewart, senior vice president, chief security and trust officer of Cisco once said that “Digital traffic continues to increase as we sprint into the Zettabyte Era, with global annual totals projected to triple in three years. By 2020, wireless and mobile device traffic will account for two-thirds of total global IP traffic.

What this means for corporations is that there is no turning back this impeding future. Employees bringing their own device to work, and accessing corporate data from mobile devices will unknowingly pose threats to corporations and will have security professional searching for ways to mitigate the risks inherent in […] Read more