Mobile device

hit by “wannacry” (may be you deserve it) …

Guys Again a ransomware outbreak on the news. May I say I am not surprised at all? And may I say that the media coverage has been ridiculous and instead of presenting the event as something that should highlight the incompetent behaviour of managers targeted by this issue they claims about “cyberattack” which is a completely different thing. And yet people asking why? how come? how this can be possible? again really? We know that CyberSecurity is always a side though from most of the management no matter where. The proof, beside the claims from CEO, IT Managers and generally speaking CxO,…

Beyond BYOD: Securing the mobile workforce

Beyond BYOD: Securing the mobile workforceSC MagazineCompanies realize bring-your-own-device (BYOD) policies create new risks with a plethora of challenges going far beyond those previously. However, most organizations are still lagging behind on making the changes necessary to adequately address these …See all stories on this topic » Related articles BYOD: Many Call It Bring Your Own Malware (BYOM) Beyond your device: control, connect, experience BYOD security and the importance of covering your backend Is Your Company Achieving the Full Value of BYOD? BYOD security and the importance of covering your backend First there was BYOD, but what about bringing your own…

Posts navigation
Stop censorship
%d bloggers like this: