Enterprises continue to struggle with BYOD policies, even though they are crucial for managing and securing personal devices in the workplace. Here are nine tips for effectively communicating your BYOD policy offered by Ryan Kalember, chief product officer for WatchDox.
U.S. employees and employers are extremely lax about password use, opening their firms to possible security breaches.
One of every four workers in your IT staff could be gone this year--lured away by headhunters and hiring managers promising more money, better recognition and a more satisfying work environment.
Advanced persistent threats are on the rise, and phishing emails are the preferred method of attack, according to a survey of 200 U.S.-based employees conducted by security firm SilverSky.
Mobility can be a frustrating experience for employees and a security nightmare for enterprises, according to data compiled by Cisco.
Fewer than half of IT managers polled by email security provider DataMotion are confident that their company could pass a security compliance audit.
Today, I came across some good BYOD advice from the UK Information Commissioner's Office, which I thought I would share with you.
Just when you thought you had all of the acronyms down--BYOD, COPE, CYOD, MDM, MAM--here comes another one: bring your own cloud.
Employees should not put personal information on their own smartphones if they use them at work, advises James Kendrick with ZDNet.
The Department of Energy, the agency in charge of the U.S. nuclear weapons program, has admitted that a data breach in July exposed personal information, including names, Social Security numbers, and dates of birth, of 53,000 past and current employees, dependents and contractors.