The BYOD (bring your own device) movement is going strong and shows no signs of disappearing any time soon. But for many businesses that are hesitant to adopt BYOD, it's not the idea or process of ...
Threats to the enterprise posed by an employee-owned mobile device can be as complex as a sophisticated malware attack designed to snoop on an employee's browsing activity or as simple as a lost phone ...
Less than 30% of firms expecting their workforce to be fully in person over the next five years, according to research by the British Chambers of Commerce. Therefore, many enterprise technology ...
Intel in 2009 first recognized the issue of bring your own device, or BYOD, as employees increasingly wanted to use their own mobile devices in the workplace. Instead of turning their backs to the ...
The popularity of BYOD programs requires innovative security and safety initiatives to minimize financial risk. The surging popularity of BYOD (bring-yourown-device) programs, which allow corporate ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. By Michelle Maisto Whether an individual or the ...
A new survey from Acronis® and the Ponemon Institute reveals that a majority of companies are putting critical data at risk by not having secure bring-your-own-device (BYOD) policies in place. By ...
Like most IT security risks, one of the greatest concerns of enterprises today can be hard to spot – at first. The small, rectangular outline in an employee’s shirt pocket. The nearly flat case ...
(Editor's note: In this guest essay, James Bindsiel, Vice President of Client Support Services, at Globalscape, examines the progression of risky technologies embraced by workers. Globalscape supplies ...
If your BYOD user policies are too strict, then you might be running afoul of the law. In a case last year, the NLRB made the unprecedented argument that an at-will employment policy could “chill an ...