Loading the content...
Navigation
Tag archives for:

mobile device usage policies

How a Florida court ruling impacts digital privacy

Early this year, we all watched the legal battle between Apple and the FBI unfold about access to the iPhone 5C used in the 2015 San Bernardino massacre. The feud ended, at least temporarily, on March 28 when the FBI withdrew its case from the courts after a third-party managed to unlock the device. With no real resolution provided, additional court cases have popped up surrounding the critical issue of digital privacy, and this month, the Florida Court of Appeals ruled that the government can force an iPhone user to release the passcode to unlock his/her phone. Read More

Best practices for international BYOD usage

As cybersecurity presents an increasingly complex and concerning environment for personal, business and government safety, attention to the secure use of mobile devices is more important than ever for individuals around the world. In fact, recent news of cybercriminals and hackers having connections deeply rooted in the Russian government, as well as the thousands of unauthorized “app stores” hosted in China, has underscored the growing number of threats in existence — and therefore a clear need to be proactive. Read More

Are your tech tools creating employee engagement?

From the telephone to email to intranets to enterprise social networks, businesses have long worked to apply the latest technologies in the hopes of improving efficiency and productivity. Despite the effort, it appears many companies are currently missing the mark. In fact, according to a recent Global Engagement Survey conducted by Oracle, 56 percent of employees reported not having access to the latest technology needed to do their jobs well. Read More

Policies and governance of mobile devices

In this environment of expanding digital workspaces, mobile devices are connected to more data than at any other time in history. Study after study shows that mobile access is increasing at an exponential rate. This comes as no surprise given that each of us are finding ways to use our mobile devices for an incredible number of functions, from sending email to conducting research, from shopping to looking up driving directions, from accessing company resources to creating on-the-job efficiencies. Read More

The pros and cons of messaging apps in the enterprise

Messaging Apps in the Enterprise
Clear, consistent communication is vital for the productivity and growth of any organization. For years the primary method of communicating was via phone. Now, as technology allows us to collaborate and connect from virtually anywhere at any time, companies are forced to evaluate a number of communication tools, including many popular messaging apps available on mobile devices. From WhatsApp and Facebook Messenger to iMessage and Google Hangouts, these apps bring IT teams to a crossroads between the pros of a more open approach and the potential perils of careless worker app use. Read More

Mobile devices: Your company’s biggest security weakness?

Whether you’re an avid “From the Orchard” reader or simply view our blog from time to time, it’s likely you’ve noticed that we do our best to keep you out in front of major security threats and aware of ways to help combat them in your organization. While it’s probably no surprise that corporate-provided and BYOD (bring your own device) mobile assets pose a substantial risk to your company data, it’s important to understand that a balance between technology solutions and human solutions is the best way to protect your organization from harm. Read More

Back to top