As the number of the confirmed positive cases and death cases of the pandemic COVID-19 continue rises even under Movement Control Order in Malaysia, the Prime Minister, Tan Sri Muhyiddin Yassin announced the extension of MCO for another two weeks until April 14. The extended MCO will certainly impact incomes and cash flows. How could the companies in Malaysia keeps their employees at safe during the virus attack and sustain their business at the same time?
Most of the companies comply the MCO and urged employees to work from home with company-owned or dedicated mobile devices. Ideally, companies may want to […] Read more
COVID-19, referred to the Novel Coronavirus, is globally affected over 100,000 people direcly and millions indirectly. For years we’ve heard in Information Security that “the perimeter is dead,” but now is the time that we test it as some companies look at completely closing physical access to buildings at scale during the Movement Control Order. The IT perimeter definitely exists; we can point to firewalls and DMZs and a loose correlation in most companies between some types of digital assets and the physical boundaries of the company. But the believe that the perimeter can stop serious, advanced attacks has long […] Read more
As cases of the Novel Coronavirus (COVID-19) are increasing over the country, most of the companies are changing their workforce to home-working to curb the virus spread. Teleworking, “remote working,” or simply “working from home,” is a centerpiece of those efforts to reduce the risk of contact with COVID-19, complying the Movement Control Order. While remote working arrangements may be effective to slow the community spread of COVID-19 from person to person, they present cybersecurity challenges that can be different than on-premise work. Here is a list of considerations and tips to help guide businesses through these challenges:
Review your current […] Read more
As of March 19, tens of thousands of companies worldwide are making major changes to reduce the risk of employees contracting COVID-19, by allowing remote working from home.
Working from home is a hard adjustment for anyone to make, especially for the employees of companies which have never permitted remote working before. These companies have to decide about remote work options in a short period of time, regarding how best to manage employees and keep them accountable when working from home.
Implementing Mobile Device Management (MDM) technology in place is an ideal first step towards offering sustainable remote work options. By enrolling […] Read more
As the Prime Minister Muhyiddin Yassin has ordered a partial lockdown of all public activities in the country from March 18 until March 31, it forced the closure of all government and private premises except essential services. Due to the Movement Control Order, companies are determined to protect their employees and minimize the impact of COVID-19 by enforcing work from home policies. However, those actions can be used against employees as any firms are likely unprepared for the criminal appetite for the cyberattack exploitation of a remote workforce. Here are some of the key issues of which companies have to […] Read more
An employee’s work space has evolved a lot over time an there are increased of the employee’s need for flexibility due to the idea of “sit down job”. The digital work space should allow the employee to work from any place and at any time. It should enable them to make well-informed decisions on the go. The initiatives like bring your own device (BYOD) should be encouraged in such an environment. This should all be possible without compromising security. There are five keys on how to improve employee work space experience to build an employee-centric work space.
Provide a smooth on-boarding experience
Empowerment […] Read more
In contemporary times, where any company whether large or small is not restricted to premises, using of On-Premise Software for Mobile Device Management (MDM) is a traditional approach. The widely used alternative for companies to manage their mobile devices and mobile employees are the use of MDM based on cloud. Today, companies tend to implement cloud-based MDM systems as they provide more reliable, stable and scalable management services than any other solutions available.
Choosing between the two MDM (Cloud vs On-premises MDM) models depends on a multitude of factors such as the degree of policies and modifications required or the data transfer security concerns. These problems are […] Read more
Enterprise mobility management: Securing data at rest, in transit, and in use
Managing the security of mobile endpoint devices such as smartphones, laptops, and tablets is different from managing the security of the stationary computers. In the case of the former, more geography-specific functionalities are required to be considered.
For Data at Rest
Passcode enforcement is used for encryption and a strong passcode can prevent unauthorized access of data at rest. By providing the security policies, the app authorization for data access is able to avoid unauthorized apps from accessing data by enterprise-approved apps and vice versa. The organization can […] Read more
As part of digital transformation, the adoption of a wide range of devices for work is on the rise. A unified endpoint management (UEM) solution is capable of enforcing management policies and configurations, as well as securing endpoints.
Why is endpoint security essential in enterprises with multiple types of endpoints?
Most business applications have expanded to the cloud. Employees who use laptops, mobile devices, and other devices, need to access data from anywhere, including within the office, from a remote office, or when traveling. By empowering employees to work with their devices around the clock, this arouses the need for […] Read more