Even Apple can’t escape change forever. The famously restrictive company will allow third-party app stores for iOS devices, along with allowing users to “sideload” software directly. Spurring the move is…
Browsing CategoryMobile Device Management (MDM)
Threat Management and Unified Endpoint Management
The worst of the pandemic may be behind us, but we continue to be impacted by it. School-aged kids are trying to catch up academically and socially after two years…
The Modern Workplace: Keeping Remote Workers Productive and Secure
Results from the March 30, 2020, Gartner CFO Survey indicate that 74% of businesses intend to shift some employees to permanent remote work following their initial experience responding to current…
The Latest Mobile Security Threats and How to Prevent Them
For many of us, the last few months have drastically increased our reliance on mobile capabilities. Through the increased use of corporate mobile apps, virtual private networks (VPNs), hot spots…
Manage All the Things: Unified Endpoint Management (UEM) and the Expanding IoT
The concept of unified endpoint management (UEM) typically implies the convergence of mobile device and PC endpoint management under a single team and management platform. But as the types of…
Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce
By explaining the “why” behind certain rules and policies, security teams can improve workforce risk awareness and, in turn, raise the security posture of the overall business.
Phishers and iPhone Thieves Rolling Out Multimillion-Dollar Operations
IBM X-Force Incident Response and Intelligence Services (IRIS) researchers recently went down the rabbit hole of a physical iPhone theft that was followed by a SMiShing campaign designed to unlock…
Android Enterprise Adds Flexibility But Still Calls for UEM Solutions
With the deployment of Android 10 on all new smartphones comes Android Enterprise, previously known as Android for Work. Even though it has its roots in Android 5.0 (Lollipop) launched…
What Is Rich Communication Services? Breaking Down the Benefits and Security Risks
Texting has been around since the 1990s, and it has served us well. Users have sent countless messages, and these exchanges have facilitated such developments as SMS-based two-factor authentication (2FA)…
How Unified Policy Management Can Enable Business Flexibility, Productivity and Security
Do laptops have a place in the modern workplace? With more than 57 percent of enterprise internet usage occurring over mobile devices as of 2017, according to BrightEdge, and Gartner…