Do you think the companies are fully prepared for the security challenges? After studying one of the latest research* regarding security practices in organizations, I’m afraid they are not. Although up to 64% respondents are aware of the number of mobile security threats that have been raised and will raise in the future, most of them are using single random mechanisms to make their organisations safe and secure.
Many companies and institutions are currently facing challenges far greater than usual ones, which significantly affects a lot of areas of their business. One of such areas that may suffer badly in the coming months is security. Wanting to prevent potential threats and to protect companies from cyberattacks, we offer our system for managing and securing mobile devices for free for 3 months.
There’s only a stone’s throw between unlocking a phone and a data breach. And although we associate “data leaks” only with sensitive data of large corporations, it should be a concern of all of us. We chose five areas in which we should be extra careful – access, geolocation, communication, apps and mobile banking.
Today, the discussion about working remotely is far more heated than ever. As coronavirus is spreading across the globe at a rapid speed, employers, to ensure a healthy work environment, are encouraging their employees to work remotely. We should all remember that the health and life of our employees always comes first, so let’s consider how we can help them be safe (and to keep our data secure at the same time).
Today, to celebrate Data Protection Day, I’ve prepared 3 quick and easy tips&tricks on how to protect your corporate and private data, that you can implement right now. And because at Famoc we’re #ObsessedWithSecurity, I used knowledge gained on my everyday job. If you want your data to be safe and sound, learn what our pros at Famoc do […]
Both “mobile device management” and “data security” contain many meanings of MDM/ EMM solutions. Let’s even say – too many. Meanwhile the functions of such platforms are very specific and pursue very important challenges that are really useful in many organizations from different industries. Let’s imagine for example…
The idea of writing this article arose from a previous article on LI “Jak “przeskanowałem” Polskę” (“How I scanned Poland”). And to be more precise from questions that appeared in my private inbox on LinkedIn. People were interested on how to secure their servers and asked to check if their servers are safe. You can […]
Do you remember phrases like OMA DM, SyncML or OMA CP? No? Take it easy! It’s been a long time since the foundation of the first Mobile Device Management systems (or some similar systems) appeared on the market. Since then a lot has changed, a lot of new protocols and many more systems have been made. Now, most of you have probably heard about shortcuts like MDM, EMM and the hottest and latest one – UEM. Mobile devices are part of our life and it is really hard to imagine working without these tools even if you are an employee of a nuclear power plant! Let me tell you a story…
Android Q brings new features for enterprise, but in the same time deprecates one that stuck for the last 9 years… Device Admin! Device Admin was available since Android 2.2, so quite a looong time. No wonder that now, when Android 10 is about to come, Device Admin is outdated and has already been for a long time. It was considered a legacy management approach even back in 2014, when Android 5 with fully managed device and work profile was released. Since Device Admin introduction in 2010, Android came a long way – surprising, huh? :). As a result, Device Admin is not well suited to support today’s enterprise requirements.
Let’s start with a small confession: I used to be a real ignorant when it comes to everything related to data security, passwords, permissions, sharing information on the internet, etc. Probably, still all these issues I could pursue with even greater care but it looks really reasonable now when I look back and compare my current state of knowledge and awareness of threats with that lack of interests and all those bad habits from the previous years. I don’t want to justify myself (or maybe a little), rather it’s one of those thousands situations that confirms an old truth that the example comes from the top.