Posted on 12 September 2011 by
Mobile phones are fast moving beyond communications, beyond gaming, social and productivity tools, to take on a vast number of new applications thanks to the use of NFC-based technology and data services. We’re theoretically able to unlock hotel rooms, pay for groceries, secure deals with location-based vouchers and work on the go. We can do […]
Posted on 16 June 2014 by
What’s the one thing you can’t leave your house without: your wallet, or your house keys? Chances are it’s your mobile device.
Posted on 26 September 2014 by
As the leader of a company, the CEO has access to the most private, valuable information from corporate strategy and financial results to sensitive employee data. Few will argue with the fact that the CEO is someone who needs advanced security.
Posted on 10 October 2014 by
C-Suite executives need the latest technology to showcase a company’s services but this puts pressure on the IT department security around CxO devices. However, a balance can be struck.
Posted on 17 October 2014 by
We believe the executive assistant is among those with the keys to the company’s lifeblood and information, so shouldn’t we be giving them the same level of protection as CxOs?
Posted on 31 October 2014 by
CIOs considering how their organization is exposed to different risks could gain some helpful insights from the heroes and villains in recent comic-book movie adaptions.