+1 855 259 6624

Category: Technology

MMS: Your Ally Against Malware

May 13, 2016 by Matt Louden

Malware is relentless. Kaspensky Lab and Allot Communications discovered 80% of businessmen and 67% of businesswomen put their company at risk of attack every day. Your mobility team needs Managed Mobility Services (MMS) in their corner to keep your enterprise off the ropes. As mentioned here, malware has nasty consequences. Bad code or data storage habits open the door for software-side malware attacks, but improper usage and authorization adherence by users causes infections too. This is where MMS has your back. Malware appears most commonly as a rogue app split into small, hard-to-detect packets that mimic legitimate apps. This is troubling, as IBM and the Ponemon Institute found that 55% of companies never test apps or are unsure of how frequently they do. In addition, CITO Research and Apperian discovered that only 51% of companies have metrics in place to monitor…

Read Article

Aware of Malware?

May 5, 2016 by Matt Louden

Mobile apps are all the rage. Accenture found that 87% of businesses believe apps are necessary to fully realize digital benefits, 85% believe apps will be the dominant business interface,  82% believe apps are integral to success, and 81% believe apps are key to unlocking vital data. However, this new technology brings a major threat: malware. What’s the Risk? IBM and the Ponemon Institute discovered that 82% of IT professionals believe apps significantly increase mobile security risks, and after further investigation it’s clear why. Businesses spend less than six percent of app development costs on security, leaving only 41% with sufficient app security. Less than 50% have acceptable app usage policies, meaning sensitive data and critical networks are frequently exposed to malware. According to HP, 97% of apps contain potential privacy issues, 86% lack basic security, and 75% fail to properly…

Read Article

Avoid the Cost of ‘Lost’ with MMS

April 29, 2016 by Matt Louden

Every minute, 113 mobile phones are lost or stolen according to Novell.  That adds up to 160,000 lost devices as found by Aruba Networks. Lost or stolen devices cost companies worldwide a staggering $7 million per day – a devastating potential and that is just the tip of the iceberg. Without Managed Mobility Services (MMS) securing your devices – and your data – and managing your Enterprise Mobility Management (EMM), a bad situation could get much worse. At the most basic level, MMS includes services to engineer and maintain an organization’s EMM/Mobile Device Management (MDM) infrastructure to keep corporate data safe.  Some of the most popular EMM/MDM solutions are from companies like Airwatch or MobileIron. CCB Technology discovered 74% of businesses experienced data breaches due to unsecured devices in 2015, making MMS oversight crucial in preventing data losses or leaks….

Read Article

Top 10 Dangers of Lost or Stolen Devices

April 21, 2016 by Matt Louden

Enterprise mobility managers are constantly bombarded with high-tech security threats growing, evolving, and multiplying every second. A lost or stolen device, despite being one of the more traditional mobility risks, often proves to be the most dangerous. The damage one of these devices is capable of inflicting on an organization could be catastrophic unless a secure Enterprise Mobility Management (EMM) solution is in place, as it takes 50% of employees more than 24 hours to report a lost or stolen device according to a Kaspersky Lab survey done in 2014. If your company doesn’t have an EMM or doesn’t have one working effectively, here are 10 things to expect when a phone goes missing: 1. Data loss or theft According to McAfee and Carnegie Mellon University, half of company devices own “business critical” data, and one-third of lost or stolen devices result in…

Read Article

Mobility in a Galaxy Far, Far Away…

December 17, 2015 by Josh Garrett

  Almost There… Almost There… The upcoming release of Star Wars: Episode VII (The Force Awakens) has me more excited for a new movie than I’ve felt in a long time. It also got me thinking about how the movies relate to what we do here at MOBI.  The biggest question I have is, “How was an organization the size of the Galactic Empire able to manage all their mobile devices?” (Quick Note: I am not saying I’m an expert on all things Star Wars, so take this with a grain of salt…)   Where the Force is Strong, There is Also Mobility While major players could always use the Force for some types of communication, how does the bottom-of-the-totem pole Storm Trooper communicate? The answer to that is an integrated comlink within their helmet, although they also carried a…

Read Article