COVID-19: Business Continuity Outside the Workplace
COVID-19, referred to the Novel Coronavirus, is globally affected over 100,000 people direcly and millions indirectly. For years we’ve heard in Information Security that “the perimeter is dead,” but now is the time that we test it as some companies
COVID-19: Work from Home May Increase Cyber Threats
As the Prime Minister Muhyiddin Yassin has ordered a partial lockdown of all public activities in the country from March 18 until March 31, it forced the closure of all government and private premises except essential services. Due to the
Prepared business for Coronavirus With a Solid Enterprise Mobility Policy
With constant news and updates coming down our throats, it is impossible to ignore the impact that the recent outbreak of coronavirus — more appropriately known as COVID-19—has on the world. When the epidemic spreads and more countries start to
How Pandemic COVID-19 Ushered in a New Way of Working?
Early before the outbreak of coronavirus, and now declared pandemic, working from home was already gaining traction. Now, most of the employees were forced to practice home-working for the sake of health and safety. In the US alone, 4.7 million or
Increased Adoption Of Kiosks, Rugged Devices, And IoT
The first thought comes into your mind when you hear the phrase “mobile device”, I bet it is a smartphone. As you read this, you are probably holding one or can find one in your pocket or bag. However, there’s
How to enable remote workforce, secure corporate data and reduce mobile threats
Dealing with the COVID-19 pandemic can be extremely stressful for both employees and employers. The increase in the number of employees working from home can create several challenges for the company. How do you enable employees who are not used to working
Factors to be considered before choosing the MDM
In the previous blog post, SMEs were told why they should use Mobile Device Managemen (MDM). This article therefore mainly reveals the number of factors that you should consider prior to the adoption of the MDM solution in your company. Management
Key Security Functions of Unified Endpoint Management – Part 2
Enterprise mobility management: Securing data at rest, in transit, and in use Managing the security of mobile endpoint devices such as smartphones, laptops, and tablets is different from managing the security of the stationary computers. In the case of the former, more
How is Virtual Reality (VR) used in business?
"More than 150 businesses in multiple industries are evaluating or implementing AR / VR technologies, including 52 of the Fortune 500" – The Experience of DeloitteVR has gone beyond gaming and entertainment and has reached the mainstream. Big companies are now testing
Key Security Functions of Unified Endpoint Management – Part 1
As part of digital transformation, the adoption of a wide range of devices for work is on the rise. A unified endpoint management (UEM) solution is capable of enforcing management policies and configurations, as well as securing endpoints. Why is endpoint