Mobile apps have become a daily staple of our lives. Do you have to order food? You have an app for that.Read More
Category: Mobile

Massive iCloud Hack Shows Criticality of Strong Authentication
Apple has a reputation for building secure systems. The Mac is still far more hack proof than PCs, and theRead More
Why Mobility Management Matters to MSPs’ Customers
As an MSP, does the following scenario sound familiar to you? A customer (say a small financial institution) calls youRead More
Simple Can be Harder than Complex
“Simple can be harder than complex: You have to work hard to get your thinking clean to make it simple.Read More
Augmenting Active Directory to Manage Mobile Devices
For more than two decades, IT admins have relied on Active Directory (AD) or LDAP to broker network access toRead More
Multi-Factor Authentication on Mobile Devices
My friend Tony loves electronics and gadgets and probably owns every type of man toy – iPads, home theatre system,Read More
Does the Math for BYOD Add Up?
The Bring-Your-Own-Device (BYOD) program has several benefits from an IT administration and general business perspective, such as improving employee jobRead More
Manage Data, Not Devices
I recently read Verizon’s 2014 Data Breach Investigations Report which investigated 63,437 confirmed security incidents including 1,367 confirmed data breachesRead More
Mobile App Management for Ultimate Control of Mobile Devices
If you ever want to see top notch diligence, watch a first time mom pack her toddler’s lunch box –Read More
Users Are Going Mobile And So Should Your IT Management
Circa 2003: I needed to print sensitive corporate data for a client meeting the next morning. Those files were storedRead More