C-Suite and Techies: Minimizing End User Errors

Security is an essential business responsibility. For the typical organization, at least half of the violations of the security policy are from internal personnel. While most of those violations are mistakes or errors caused by ignorance, some are performed intentionally and maliciously, against the company, other employees — or even customers. For a top executive, reducing these violations is crucial to maintaining a growing business. For an IT manager and/or security manager, reducing these violations is important to prevent downtime and improve efficiency. Fortunately, there are many steps that can be taken to help reduce end-user security violations. Most of these solutions are a combination of technology and training. And they are designed to address specific situations. These ideas might not address every issue occurring in your organization, but you are likely dealing with a majority of these concerns.

Read more

What Your IT Guy Wishes You Knew About BYOD

BYOD. Yes, it sounds like something that should be included on a party invitation. But to your IT team, BYOD is anything but a tasty beverage because it requests people to Bring Your Own Device. According to a Gartner study, 38 percent of companies expect to stop providing devices to workers by 2016. This means the purchasing decision will potentially be in your hands.

Read more

Three Real Costs of Bring Your Own Device (BYOD)

Many organizations are supporting the consumerization of IT by requiring or allowing personal computing devices as work productivity tools. A one-step removed view of the practice makes this seems like a quick win for everyone. The employee uses the device he or she prefers and the organization transfers device support to the employee. However, a closer look reveals unanticipated costs on both sides of the arrangement.

Read more

The Future of Mobile Management Services

When it comes to employing mobile device management (MDM), many organizations are faced with solution silos. For example, a company might have a pre-existing MDM solution that was deployed at the start of BYOD adoption. It may also be using device-specific tools to manage purpose-built or ruggedized mobile devices, separate from user smartphones. A more recent MDM solution might be deployed to cover new devices and users.

Read more

What’s Up at Interop

Two years ago, I attended my first Interop IT Conference and Expo in Las Vegas, and it left quite an impression on me. I’d heard about the “granddaddy of all IT conferences,” as it is now in its 28th year, and it didn’t disappoint. Despite the cool parties, the cool swag, and the well-staffed booths, Interop was also wall-to-wall with the world’s IT leaders in attendance. And I was in awe. This year is no different.

Read more