Close to half of organizations either do not have a mobile device policy at all or have not fully implemented the policy they have in place, according to a survey of 1,100 IT security pros who are members of the LinkedIn Information Security Community.
If you're trying to convince the boss of the importance of integrating digital, cloud and mobile strategies, you may want to listen up. According to a small but interesting survey conducted by Canon U.S.A, IT decision-makers and their executive counterparts have pretty divergent opinions when it comes to document workflow technology.
For insights on what consumerization in IT means to you, we invite you to join the FierceCIO webinar on "Consumerization and the CIO" to be held July 29, at 2 p.m. EST.
Millennials are more likely to break the rules when it comes to bring-your-own-device policies, according to a new study. But while they flout written guidelines, much of the time they do so in order to work more effectively.
The top news stories for July 18, 2014.
Mobility can open up the firm to security threats, such as lost or stolen devices with corporate data on-board or malware infection from an insecure app. To help enterprises cope with the security challenge posed by BYOD and mobility, FierceMobileIT is bringing together a panel of experts for a July 24 webinar at 1 pm ET covering the topic.
Many IT managers are not backing up their BYOD policies with measures to ensure employees comply with the policies.
Check out the hottest mobile IT stories for July 10, including the latest numbers on Jello Labs funding, the expected growth of smartphones for 2018, what kind of product makes up the majority of wearables, the technology TechNavio says is fueling software sales and what the big tech companies will do next to track customers.
Organizations have yet to realize the full benefits of mobility. To derive full value from BYO and give rise to a true mobile enterprise, it is critical to understand its prospective evolution, writes David Lavenda.
Companies are struggling to deal with the flood of personal devices coming into workplace. Here are six success factors from cloud and mobile security provider Bitglass that IT managers should keep in mind when crafting a BYOD program.