COVID-19: Secured Workforce during MCO

COVID-19: Secured Workforce during MCO

As the number of the confirmed positive cases and death cases of the pandemic COVID-19 continue rises even under Movement Control Order in Malaysia, the Prime Minister, Tan Sri Muhyiddin Yassin announced the extension of MCO for another two weeks until April 14. The extended MCO will certainly impact incomes and cash flows. How could the companies in Malaysia keeps their employees at safe during the virus attack and sustain their business at the same time?

Most of the companies comply the MCO and urged employees to work from home with company-owned or dedicated mobile devices. Ideally, companies may want to […] Read more

COVID-19: Business Continuity Outside the Workplace

COVID-19: Business Continuity Outside the Workplace

COVID-19, referred to the Novel Coronavirus, is globally affected over 100,000 people direcly and millions indirectly. For years we’ve heard in Information Security that “the perimeter is dead,” but now is the time that we test it as some companies look at completely closing physical access to buildings at scale during the Movement Control Order. The IT perimeter definitely exists; we can point to firewalls and DMZs and a loose correlation in most companies between some types of digital assets and the physical boundaries of the company. But the believe that the perimeter can stop serious, advanced attacks has long […] Read more

COVID-19: Managing Cyber Security Risks of Remote Work

COVID-19: Managing Cyber Security Risks of Remote Work

As cases of the Novel Coronavirus (COVID-19) are increasing over the country, most of the companies are changing their workforce to home-working to curb the virus spread. Teleworking, “remote working,” or simply “working from home,” is a centerpiece of those efforts to reduce the risk of contact with COVID-19, complying the Movement Control Order. While remote working arrangements may be effective to slow the community spread of COVID-19 from person to person, they present cybersecurity challenges that can be different than on-premise work. Here is a list of considerations and tips to help guide businesses through these challenges:

Policy
Review your current […] Read more

5 Ways MDM Solutions Help in Work from Home

5 Ways MDM Solutions Help in Work from Home

As of March 19, tens of thousands of companies worldwide are making major changes to reduce the risk of employees contracting COVID-19, by allowing remote working from home.

Working from home is a hard adjustment for anyone to make, especially for the employees of companies which have never permitted remote working before. These companies have to decide about remote work options in a short period of time, regarding how best to manage employees and keep them accountable when working from home.

Implementing Mobile Device Management (MDM) technology in place is an ideal first step towards offering sustainable remote work options. By enrolling […] Read more

COVID-19: Work from Home May Increase Cyber Threats

COVID-19: Work from Home May Increase Cyber Threats

As the Prime Minister Muhyiddin Yassin has ordered a partial lockdown of all public activities in the country from March 18 until March 31, it forced the closure of all government and private premises except essential services. Due to the Movement Control Order, companies are determined to protect their employees and minimize the impact of COVID-19 by enforcing work from home policies. However, those actions can be used against employees as any firms are likely unprepared for the criminal appetite for the cyberattack exploitation of a remote workforce. Here are some of the key issues of which companies have to […] Read more

Improving Work Experience with a Digital Workspace

Improving Work Experience with a Digital Workspace

An employee’s work space has evolved a lot over time an there are increased of the employee’s need for flexibility due to the idea of “sit down job”. The digital work space should allow the employee to work from any place and at any time. It should enable them to make well-informed decisions on the go. The initiatives like bring your own device (BYOD) should be encouraged in such an environment. This should all be possible without compromising security. There are five keys on how to improve employee work space experience to build an employee-centric work space.
Provide a smooth on-boarding experience
Empowerment […] Read more

Cloud vs On-Premises MDM

Cloud vs On-Premises MDM

Many companies have trouble choosing solutions for Mobile Device Management (MDM) between cloud-based or on-premises solution. While setting up the IT infrastructure for your business, you will be concerned with the simple inquiries “Should I pursue on-premises solutions or migrate to the cloud?”. The truth is that there is no one size that suits all the best model for your company. In reality, only you can choose based on the nature and specifications of your business, but this rundown on the various features of each deployment model should make it easier.

Now let’s take a look at the various options available […] Read more

Key Security Functions of Unified Endpoint Management – Part 2

Key Security Functions of Unified Endpoint Management – Part 2

Enterprise mobility management: Securing data at rest, in transit, and in use

Managing the security of mobile endpoint devices such as smartphones, laptops, and tablets is different from managing the security of the stationary computers. In the case of the former, more geography-specific functionalities are required to be considered.

For Data at Rest
Passcode enforcement is used for encryption and a strong passcode can prevent unauthorized access of data at rest. By providing the security policies, the app authorization for data access is able to avoid unauthorized apps from accessing data by enterprise-approved apps and vice versa. The organization can […] Read more

Key Security Functions of Unified Endpoint Management – Part 1

Key Security Functions of Unified Endpoint Management – Part 1

As part of digital transformation, the adoption of a wide range of devices for work is on the rise. A unified endpoint management (UEM) solution is capable of enforcing management policies and configurations, as well as securing endpoints.
Why is endpoint security essential in enterprises with multiple types of endpoints?

Most business applications have expanded to the cloud. Employees who use laptops, mobile devices, and other devices, need to access data from anywhere, including within the office, from a remote office, or when traveling. By empowering employees to work with their devices around the clock, this arouses the need for […] Read more