Today, the discussion about working remotely is far more heated than ever. As coronavirus is spreading across the globe at a rapid speed, employers, to ensure a healthy work environment, are encouraging their employees to work remotely. We should all remember that the health and life of our employees always comes first, so let’s consider how we can help them be safe (and to keep our data secure at the same time).
Today, to celebrate Data Protection Day, I’ve prepared 3 quick and easy tips&tricks on how to protect your corporate and private data, that you can implement right now. And because at Famoc we’re #ObsessedWithSecurity, I used knowledge gained on my everyday job. If you want your data to be safe and sound, learn what our pros at Famoc do […]
Both “mobile device management” and “data security” contain many meanings of MDM/ EMM solutions. Let’s even say – too many. Meanwhile the functions of such platforms are very specific and pursue very important challenges that are really useful in many organizations from different industries. Let’s imagine for example…
The idea of writing this article arose from a previous article on LI “Jak “przeskanowałem” Polskę” (“How I scanned Poland”). And to be more precise from questions that appeared in my private inbox on LinkedIn. People were interested on how to secure their servers and asked to check if their servers are safe. You can […]
Do you remember phrases like OMA DM, SyncML or OMA CP? No? Take it easy! It’s been a long time since the foundation of the first Mobile Device Management systems (or some similar systems) appeared on the market. Since then a lot has changed, a lot of new protocols and many more systems have been made. Now, most of you have probably heard about shortcuts like MDM, EMM and the hottest and latest one – UEM. Mobile devices are part of our life and it is really hard to imagine working without these tools even if you are an employee of a nuclear power plant! Let me tell you a story…
Android Q brings new features for enterprise, but in the same time deprecates one that stuck for the last 9 years… Device Admin! Device Admin was available since Android 2.2, so quite a looong time. No wonder that now, when Android 10 is about to come, Device Admin is outdated and has already been for a long time. It was considered a legacy management approach even back in 2014, when Android 5 with fully managed device and work profile was released. Since Device Admin introduction in 2010, Android came a long way – surprising, huh? :). As a result, Device Admin is not well suited to support today’s enterprise requirements.
Let’s start with a small confession: I used to be a real ignorant when it comes to everything related to data security, passwords, permissions, sharing information on the internet, etc. Probably, still all these issues I could pursue with even greater care but it looks really reasonable now when I look back and compare my current state of knowledge and awareness of threats with that lack of interests and all those bad habits from the previous years. I don’t want to justify myself (or maybe a little), rather it’s one of those thousands situations that confirms an old truth that the example comes from the top.
Recently I am really focused on my habits. I try to weed out bad ones, and at the same time introduce and nurture good ones. I learned the theory reading first Charles Duhigg’s – The power of habit and later James Clear’s – Atomic Habits (by the way, I recommend both books to everyone!), and right now I am putting their tips and rules to practice – all the way from taking daily walks early in the morning, to spending less time with smartphone and tablet when with my family.
Many organisations understand the need to protect and secure their data, even on employees’ private devices (if Bring Your Own Device policies are implemented) – the main threats which trouble the IT and security managers are potential loss or theft of data and lack of user awareness (based on a report we’ve done together with Computerworld in 2018 ).