Webinar Summary: Embrace Digital Transformation with Workspace ONE

The modern workforce is a beautiful thing. Your company’s talent can execute from anywhere in the world, potentially with whatever devices they choose. This can accelerate productivity but can cause IT challenges, especially when it comes to application and device management.

[Read more…]

How to choose the best mobile device for your workforce

How to choose the best mobile device for business

With so many great devices on the market, it can be difficult to decide which one is best to supply to your workforce. Given the productivity and efficiency gains possible from equipping employees with the right device, this isn’t a buying decision to take lightly. To help solve this purchasing dilemma, we posed the most frequent questions we get from clients to one of our in-house experts on emerging technology and Samsung products, Sharal Pinto.

[Read more…]

Do You Know Where Your Users Mobile Phones Are? [McAfee]

6 Quick Tips to Help Your Users Improve Mobile Security.

Forget dogs. With more than 4 billion mobile phones in use worldwide, not to mention, tens of millions of tablets, mobile devices are man’s new BFF (Sorry Sparky).

But our best friends are under serious threat, with hackers and scammers finding unprecedented ways to target personal and corporate data. Consider the following mobile statistics:

  • 40% of users say losing their mobile devices would be worse than losing their wallets, yet they often leave them unsupervised or unprotected.
  • More than 50% of smartphone users do not use any password protection to prevent unauthorized access to their device.
  • By 2014, mobile internet use is expected to take over desktop internet use, which could make mobile devices even more attractive to scammers and cybercriminals.

Even though we think of mobile devices as phones, they’re really mini-computers that can be more vulnerable to loss, theft, phishing scams, malware and unsecure networks than the ones sitting on our desks – vulnerability criminals are only too happy to exploit. Also, with many people using their mobile phone for both business and personal, what happens to a personal phone – affects your corporate security!

[Read more…]