We are pleased to announce that we have received the security clearance certificate from the Internal Security Agency for the protection of classified information with a secret and confidential clause!
The agency checked whether we are trustworthy and by receiving the certificate we have obtained the opportunity to implement projects in state and public institutions.
Do you think the companies are fully prepared for the security challenges? After studying one of the latest research* regarding security practices in organizations, I’m afraid they are not. Although up to 64% respondents are aware of the number of mobile security threats that have been raised and will raise in the future, most of them are using single random mechanisms to make their organisations safe and secure.
Many companies and institutions are currently facing challenges far greater than usual ones, which significantly affects a lot of areas of their business. One of such areas that may suffer badly in the coming months is security. Wanting to prevent potential threats and to protect companies from cyberattacks, we offer our system for managing and securing mobile devices for free for 3 months.
There’s only a stone’s throw between unlocking a phone and a data breach. And although we associate “data leaks” only with sensitive data of large corporations, it should be a concern of all of us. We chose five areas in which we should be extra careful – access, geolocation, communication, apps and mobile banking.
Today, the discussion about working remotely is far more heated than ever. As coronavirus is spreading across the globe at a rapid speed, employers, to ensure a healthy work environment, are encouraging their employees to work remotely. We should all remember that the health and life of our employees always comes first, so let’s consider how we can help them be safe (and to keep our data secure at the same time).
Today, to celebrate Data Protection Day, I’ve prepared 3 quick and easy tips&tricks on how to protect your corporate and private data, that you can implement right now. And because at Famoc we’re #ObsessedWithSecurity, I used knowledge gained on my everyday job. If you want your data to be safe and sound, learn what our pros at Famoc do […]
Both “mobile device management” and “data security” contain many meanings of MDM/ EMM solutions. Let’s even say – too many. Meanwhile the functions of such platforms are very specific and pursue very important challenges that are really useful in many organizations from different industries. Let’s imagine for example…
The idea of writing this article arose from a previous article on LI “Jak “przeskanowałem” Polskę” (“How I scanned Poland”). And to be more precise from questions that appeared in my private inbox on LinkedIn. People were interested on how to secure their servers and asked to check if their servers are safe. You can […]
Do you remember phrases like OMA DM, SyncML or OMA CP? No? Take it easy! It’s been a long time since the foundation of the first Mobile Device Management systems (or some similar systems) appeared on the market. Since then a lot has changed, a lot of new protocols and many more systems have been made. Now, most of you have probably heard about shortcuts like MDM, EMM and the hottest and latest one – UEM. Mobile devices are part of our life and it is really hard to imagine working without these tools even if you are an employee of a nuclear power plant! Let me tell you a story…