COVID-19, referred to the Novel Coronavirus, is globally affected over 100,000 people direcly and millions indirectly. For years we’ve heard in Information Security that “the perimeter is dead,” but now is the time that we test it as some companies look at completely closing physical access to buildings at scale during the Movement Control Order. The IT perimeter definitely exists; we can point to firewalls and DMZs and a loose correlation in most companies between some types of digital assets and the physical boundaries of the company. But the believe that the perimeter can stop serious, advanced attacks has long […] Read more
As the Prime Minister Muhyiddin Yassin has ordered a partial lockdown of all public activities in the country from March 18 until March 31, it forced the closure of all government and private premises except essential services. Due to the Movement Control Order, companies are determined to protect their employees and minimize the impact of COVID-19 by enforcing work from home policies. However, those actions can be used against employees as any firms are likely unprepared for the criminal appetite for the cyberattack exploitation of a remote workforce. Here are some of the key issues of which companies have to […] Read more
With constant news and updates coming down our throats, it is impossible to ignore the impact that the recent outbreak of coronavirus — more appropriately known as COVID-19—has on the world. When the epidemic spreads and more countries start to feel the virus ‘ impact, everyone needs to ask the question: how does this change my life?
Businesses must also address this issue, as the outbreak of coronavirus poses a serious risk to corporate operations around the world. As a result, companies must prepare for coronavirus by developing contingency solutions, including enterprise mobility solutions.
Mobile devices and solutions allow businesses to continue […] Read more
Early before the outbreak of coronavirus, and now declared pandemic, working from home was already gaining traction. Now, most of the employees were forced to practice home-working for the sake of health and safety.
In the US alone, 4.7 million or 3.4% of the population work remotely, according to career platform FlexJobs. The number is expected to rise amid the dangers posed by the novel coronavirus Covid-19.
Driven by cloud and mobile technology
A pandemic could see millions more relying on technology, specifically mobile devices and cloud-based productivity and messaging tools to stay connected even from home.
The unintended result of the outbreak caused […] Read more
The first thought comes into your mind when you hear the phrase “mobile device”, I bet it is a smartphone. As you read this, you are probably holding one or can find one in your pocket or bag. However, there’s a bigger universe of smart devices performing a wide array of critical tasks through form factors familiar and seemingly far-fetched. In fact, digital transformation is impossible without them. According to IDC, “mobility is the key to building a connected workforce that’s agile, particularly when the organization is going through rapid change.”
While being the most influencial in the world-wide smartphone market […] Read more
Dealing with the COVID-19 pandemic can be extremely stressful for both employees and employers. The increase in the number of employees working from home can create several challenges for the company. How do you enable employees who are not used to working remote? How do you quickly give them the tools and applications to securely access corporate data? How can you be sure your corporate data is secure?
According to Global Workplace Analytics, five million employees (3.6% of the workforce) worked from home half-time or more in 2019. There are currently no accurate statistics on how many employees have been working remotely since the […] Read more
In the previous blog post, SMEs were told why they should use Mobile Device Managemen (MDM). This article therefore mainly reveals the number of factors that you should consider prior to the adoption of the MDM solution in your company.
First and foremost, the management situation must be decided whether it is BYOD (Bring Your Own Device), COPE (Corporate Owned Private Enabled), CYOD (Choose Your Own Device) or COBO (Company Owned Business Only). When individuals are increasingly tied to personal devices, businesses must take into account the desires of their employees
Types of device supported
If the companies have purchased mobile devices, […] Read more
Enterprise mobility management: Securing data at rest, in transit, and in use
Managing the security of mobile endpoint devices such as smartphones, laptops, and tablets is different from managing the security of the stationary computers. In the case of the former, more geography-specific functionalities are required to be considered.
For Data at Rest
Passcode enforcement is used for encryption and a strong passcode can prevent unauthorized access of data at rest. By providing the security policies, the app authorization for data access is able to avoid unauthorized apps from accessing data by enterprise-approved apps and vice versa. The organization can […] Read more
“More than 150 businesses in multiple industries are evaluating or implementing AR / VR technologies, including 52 of the Fortune 500” – The Experience of Deloitte
VR has gone beyond gaming and entertainment and has reached the mainstream. Big companies are now testing and applying this technology for multiple purposes. Companies see a lot of potential in VR, such as improving job practices, providing world-class customer experience, training staff and more.
VR enables consumers to interpret and connect with a simulated environment. It blocks our physical world and transports us to either a concrete or an imaginative location. Oculus Rift, Samsung Gear VR are some of VR devices that […] Read more
As part of digital transformation, the adoption of a wide range of devices for work is on the rise. A unified endpoint management (UEM) solution is capable of enforcing management policies and configurations, as well as securing endpoints.
Why is endpoint security essential in enterprises with multiple types of endpoints?
Most business applications have expanded to the cloud. Employees who use laptops, mobile devices, and other devices, need to access data from anywhere, including within the office, from a remote office, or when traveling. By empowering employees to work with their devices around the clock, this arouses the need for […] Read more