5 major threats of BYOD mobile environments
Supplied by Good Technology Australia Pty Ltd on Wednesday, 13 August, 2014
As more organisations encourage the use of portable devices such as smartphones, tablets and laptops for business purposes, the potential of security breaches also increases.
While sharing real-time information improves efficiency, it also poses a few risks that can counteract the benefits of using cutting-edge technology - mobile devices and applications have limited security features, which makes them prone to malware and spyware attacks, as well as to human mistakes that can lead to exposure of sensitive company and client information or data loss.
Your USB connection can now reach a radius of 10 km
USB connections are no longer limited to the desktop range of five metres. They can now be...
Two-factor authentication – 5 points you need to know
Once you have decided to implement two-factor authentication, what is the next step? With the...
Ensuring data centre availability for the ‘always-on’ business
Modern data centres, enabled by virtualisation, need a new kind of data protection … the kind...