Filtered by: Byod

Why Your BYOD Policy & Compliance Is Failing

  In recent months, the debate over the future of BYOD has intensified. On the one hand, we really don’t need Gartner to tell us what we are already witnessing —  that more than half of all businesses will require employees to bring their own device by the end of 2017; while on the other (…)

Dror Liwer, February 28, 2017

How to Balance Wireless Network Security With the Thirst for Increased Connectivity

With workers relying more than ever on mobile devices to provide quick access to information, BYOD and BYON have become as ubiquitous and as necessary as office furniture. Yet, even though the “Bring Your Own” approach has revolutionized business, many companies still have a pre-revolutionary view to network cybersecurity. Companies still place great emphasis on (…)

Dror Liwer, February 7, 2017

Coronet Named As Top Product Enterprises Should Know About

If you don’t know that enterprise data breaches are becoming more and more of a problem, then I’m not sure where you’ve been hiding these past few years — Sony, Home Depot, Ashley Madison, Adobe, LinkedIn are just a few examples of major companies that have been hacked recently. In fact, according to a recent (…)

Dror Liwer, February 28, 2016

Are Millennials Really the Biggest Threat to Your Company’s Data Security?

With cybercrime on the rise, more and more companies are on the look out for solutions to prevent security breaches. What many don’t realize is that millennials may be the weak link in the fight against cyber attacks. After all, while millennials or digital natives are tech savvy, their <over?> reliance on mobile devices may (…)

Dror Liwer, November 17, 2015
Load More