With the looming threat of cyber crime and the fact that healthcare is one of the most strictly-regulated industries in the world, one expects providers would take more steps towards proper security.
What is the right thing to do when your C-level peers ask you to swap your mobile fleet (devices) and tools for something they fancy?
Businesses operating in regulated industries face a difficult balancing act. On the one hand, the tools and… / Read More
We’ve talked before about the importance of protecting personal health information and patient data. With this weeks’… / Read More
Last year it was reported that GOZeus (GameOver Zeus) and cryptolocker were two of the most malicious pieces of malware being used in cyber crimes against the financial industry. Banks were attacked and had hundreds of millions of dollars stolen from them.
“Wall of Sheep” sounds like an adorable Angry Birds clone involving woolly farm animals. But as I… / Read More
Staying out of your mobile device’s work container, even at work, clearly does not help corporate productivity. But using personal channels to communicate also defies the sole purpose of the work container: to ensure that corporate information stays protected. Poor container experiences have led many CIOs to peel away the enterprise security and management tools from the handheld until they know they will only see satisfaction on users’ faces.
The conversation on mobile security is one that’s never going to end. There’s always going to be some new vulnerability in the press. It’s an unavoidable fact of life in enterprise. This situation isn’t helped along by the fact that most cloud storage solutions offer little in the way of security.
BYOD, CYOD, COPE and COBO. IT managers know there are many different ways to deploy and manage… / Read More
We’re pleased to announce that BlackBerry and our partner UST Global have won a 2015 Aecus Innovation… / Read More
Here’s a cautionary tale for anyone in the middle of a tablet deployment. In late 2013, several… / Read More
How many hours a week do you spend in meetings? If you’re anything like the average employee, it’s upwards of five hours – perhaps more, with no guarantee that those hours are productive. The sad truth of modern meetings is that they’re the biggest time-waster (and money-waster) in the enterprise – you already know this. But what if I told you that the problem wasn’t with the meetings themselves? What if I told you the problem was actually you?
You may have heard the recent news about BlackBerry acquiring WatchDox – it’s something that we’re very… / Read More
It’s official: WatchDox is now part of BlackBerry. The acquisition of WatchDox — which offers the most… / Read More
Steve Wozniak once confessed that he carried seven smartphones and two tablets when traveling. The Apple co-founder… / Read More
When you think about security, “user-friendly” probably isn’t the first term that comes to mind. Digital security is complicated, confusing and sometimes nearly impossible to understand. This leads to two common misconceptions. Let’s go ahead and burst those myths.
Here’s an example of how NOT to roll out new mobile technology. Recently, the Brighton and Howe… / Read More
The fact that everyone’s adopting BYOD doesn’t automatically make it the right choice for your business – or your industry, for that matter.
RSA is one of the world’s top security conferences and BlackBerry is always a big part of… / Read More
Two-factor authentication still offers superior protection for accounts, especially cloud services and personal e-mail used to transfer work files for access at home. There’s a more reliable way to offer two-factor authentication then one-time-password hardware tokens or text messages, though.