New research from Jamf has found that IT decision makers surveyed (99%) say that their retail store(s) have implemented at least one mobile technology in store, highlighting the potential for technology to transform the shopping experience.
Mobile device management (MDM) is a proven, cost-effective solution to meet an organization’s needs for security and control. However, as organizations scale up, or need to manage risk or stay compliant, they also need to manage costs. A company’s smartphones, tablets, laptops, and other connected devices—and the apps and data plans associated with those devices—are expenses, which can quickly escalate.
Last month, I wrote an article on the Emergence of Smartphones as a Key Platform for Security Industry that discussed the growing ubiquity of smartphones within the workplace and the increasing number of mobile apps that have the ability to collect information from its environment such as video streams, audio streams, indoor location and information from other sensors.
Eight months: That’s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don’t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway.
BYOD is either a ticking time bomb or IT’s greatest opportunity. Whether you belong to the 40 percent of organizations that have policies or not, I guarantee people are using their own mobile devices at your office.
A systematic approach to developing and updating mobile device management (MDM) and Bring Your Own Device (BYOD) policies is critical to assure data protection in a mobile access environment. After you develop and implement mobile security policies, it is important to evaluate and update policies on a regular basis.
Discussions of mobile security typically revolve around the vulnerability of smartphones, tablets and the data they contain to loss and theft. Yet CIOs, CISOs and IT directors need to be equally concerned about the challenges of maintaining data security during everyday use of both corporate-issued and BYOD devices.
This month, Security magazine brings you the Security 500 Report, Rankings and Thought Leader Profiles. How does your enterprise compare to others? Which security programs are leading the way? Also this month, we highlight artificial intelligence, ransomware attacks, vaping and cybersecurity regulations.