Agencies face a delicate balancing act when it comes to providing mobile security. On the one hand, IT departments seek to extend endpoint security to a growing population of mobile devices. It's easy ...
In our last post, we discussed the current landscape of mobile device discovery, including how ubiquitous mobile devices are in our everyday lives and the trend that discovery of mobile devices has ...
WASHINGTON — Hospitals nationwide have failed to implement an effective mobile device security policy, according to presenters at the mHealth Summit 2012. Despite the fact that hospitals are a major ...
A comprehensive mobile security policy is essential now that so many employees use tablets, smart phones, USB drives and other mobile devices and media to conduct business. But a policy doesn't do any ...
Get the latest federal technology news delivered to your inbox. In the wrong hands, a government-issued mobile device poses a serious cybersecurity threat. Troublingly, a July 2023 report revealed ...
Understanding best practices for mobile device security in today’s healthcare environment can be challenge for many organizations. As mobile devices such as tablets and smartphones become more ...
The use of mobile devices in hospitals to streamline workflows and improve patient care has become commonplace. For cyber-attackers, this widespread adoption makes them an attractive vector for ...
Welcome to the fourth installment of the MDM spotlight series. There is little doubt that smart mobile devices are a boon for individual productivity, but corporate IT groups are scrambling to ...
Mobile devices are being used in the healthcare space in increasing numbers because the benefits of using mobile devices are many — the emergence of mobile applications allows physicians to easily ...
All businesses face challenges in operating efficiently, but the smaller the business the more pronounced these challenges become. Unlike larger enterprises, small enterprises do not often have the ...
Asia’s digital environment—particularly China’s mobile-first business culture and evolving regulatory landscape—is necessitating global companies to rethink Bring Your Own Device (BYOD) programs.
With the adoption of cloud computing and mobility skyrocketing, e-mail security and compliance player Proofpoint on Tuesday put its security into the public cloud and onto mobile devices with the ...