3 tips & tricks on security that you can try right now

Today, to celebrate Data Protection Day, I’ve prepared 3 quick and easy tips&tricks on how to protect your corporate and private data, that you can implement right now. And because at Famoc we’re #ObsessedWithSecurity, I used knowledge gained on my everyday job. If you want your data to be safe and sound, learn what our pros at Famoc do […]

5 ways to use FAMOC manage in your business*

Both “mobile device management” and “data security” contain many meanings of MDM/ EMM solutions. Let’s even say – too many. Meanwhile the functions of such platforms are very specific and pursue very important challenges that are really useful in many organizations from different industries. Let’s imagine for example…

How dangerous is an Open Resolver DNS?

The idea of writing this article arose from a previous article on LI “Jak “przeskanowałem” Polskę” (“How I scanned Poland”). And to be more precise from questions that appeared in my private inbox on LinkedIn. People were interested on how to secure their servers and asked to check if their servers are safe. You can […]

Wezwanie akcjonariuszy Spółki 09/2020

FAMOC SPÓŁKA AKCYJNA w Gdańsku.KRS 0000381166. SĄD REJONOWY GDAŃSK-PÓŁNOC W GDAŃSKU, VII WYDZIAŁ GOSPODARCZY KRAJOWEGO REJESTRU SĄDOWEGO, wpis do rejestru: 22 marca 2011 r. Zarząd Spółki FAMOC S.A. w Gdańsku wzywa wszystkich akcjonariuszy Spółki do złożenia dokumentów akcji w celu ich dematerializacji. Dokumenty akcji należy składać w siedzibie Spółki, tj. ul. Wajdeloty 12A, 80-437 Gdańsk, […]

Wezwanie akcjonariuszy do złożenia dokumentów akcji – 09/2020

Zarząd Famoc Spółka Akcyjna z siedzibą w Gdańsku, przy ul. Wajdeloty 12a, 80-437 Gdańsk, wpisana do rejestru przedsiębiorców Krajowego Rejestru Sądowego prowadzonego przez Sąd Rejonowy Gdańsk – Północ w Gdańsku; VII Wydział Gospodarczy Krajowego Rejestru Sądowego, pod numerem KRS 0000381166 [zwana dalej „Spółką”], w związku z art. 16 ustawy z dnia 30 sierpnia 2019 roku […]

Modern management of iOS 13

Apple has always valued user privacy above everything else. This manifests not only in their device’s interface design, the underlying principles of their operating systems but also in the way UEM / EMM vendors can apply management to their mobile devices. In any other scenario than fully corporate owned devices the user is able to remove corporate management profile at any moment. The user is also clearly informed what their IT administrator is capable on their device and if anything is not to their liking a simple click disables any control. iOS 13 is another big step towards providing the end user with more control over their device and more privacy.

(R)evolution of mobile device management. What Unified Endpoint Management actually means?

Do you remember phrases like OMA DM, SyncML or OMA CP? No? Take it easy! It’s been a long time since the foundation of the first Mobile Device Management systems (or some similar systems) appeared on the market. Since then a lot has changed, a lot of new protocols and many more systems have been made. Now, most of you have probably heard about shortcuts like MDM, EMM and the hottest and latest one – UEM. Mobile devices are part of our life and it is really hard to imagine working without these tools even if you are an employee of a nuclear power plant! Let me tell you a story…

Device Admin deprecation in Android Q

Android Q brings new features for enterprise, but in the same time deprecates one that stuck for the last 9 years… Device Admin! Device Admin was available since Android 2.2, so quite a looong time. No wonder that now, when Android 10 is about to come, Device Admin is outdated and has already been for a long time. It was considered a legacy management approach even back in 2014, when Android 5 with fully managed device and work profile was released. Since Device Admin introduction in 2010, Android came a long way – surprising, huh? :). As a result, Device Admin is not well suited to support today’s enterprise requirements.

Safety first: how not to educate your employees about cybersecurity

Let’s start with a small confession: I used to be a real ignorant when it comes to everything related to data security, passwords, permissions, sharing information on the internet, etc. Probably, still all these issues I could pursue with even greater care but it looks really reasonable now when I look back and compare my current state of knowledge and awareness of threats with that lack of interests and all those bad habits from the previous years. I don’t want to justify myself (or maybe a little), rather it’s one of those thousands situations that confirms an old truth that the example comes from the top.

3 basic smartphone security habits

Recently I am really focused on my habits. I try to weed out bad ones, and at the same time introduce and nurture good ones. I learned the theory reading first Charles Duhigg’s – The power of habit and later James Clear’s – Atomic Habits (by the way, I recommend both books to everyone!), and right now I am putting their tips and rules to practice – all the way from taking daily walks early in the morning, to spending less time with smartphone and tablet when with my family.

This site uses cookies. By using this website you agree to the use of cookies in accordance with the settings of your browser. Learn more.

I accept