No Irregular Heartbeat at Fixmo

  • April 09, 2014
  • Lee Cocking

Being the intelligent and on-the-ball customers you are, you're probably already familiar with the "Heartbleed" vulnerability that exists in certain versions of OpenSSL. If not, additional information can be found here: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 (I highly recommend reading!)

Gates weighs in on the future of devices

  • February 11, 2014
  • Dan Ford

Some people remain skeptical about the future of BYOD and the increasing importance of devices, despite the incredible predictions of continued growth from so many analysts. With new reports all the time coming out predicting huge growth to continue throughout the coming decade, it's hard to imagine needing any more convincing - but perhaps the latest comments from one of the most important figures in the history of computing could be the final straw.

To BYOD or not to BYOD, there is little question

  • February 07, 2014
  • Dan Ford

At this point, there still remain many companies who have yet to fully adopt a BYOD work operation. It's understandable, and there are many worthy concerns to address before moving fully into a deployment that allows workers to utilize their own devices.

The death of BYOD has been greatly exaggerated

  • January 27, 2014
  • Dan Ford

In the early days of BYOD, there was a large - and very vocal - contingent of people who doubted the ability to implement the operating philosophy while remaining secure. Now, years later, as such a large number of companies have settled upon the idea and found that it not only improves productivity and budgets, but allows for security if done right, that once vocal group has mostly died down. Still, one recent article by an analyst is a reminder that there remain those highly skeptical of the practice of allowing workers to use their own devices.

The changing BYOD world requires new security

  • January 15, 2014
  • Dan Ford

At this point, you may well feel that BYOD has grown as big as it possibly can - if you're deeply ensconced within an organization that takes the use of mobile devices as part of its operational imperative, then you may not be able to even consider a world with yet more devices at play. But many still expect huge changes in the coming months and years for mobile use, and the importance of these devices to continue moving upward. As such, the need for proper security such as enterprise mobility management will in all likelihood only grow more intense, too.

Getting rid of old devices after gift-giving holidays

  • December 30, 2013
  • Dan Ford

We are now firmly ensconced in the BYOD era, and it's clear that there are many precautions companies must take to be sure the use of phones is always safe and data remains secure. It's dangerous to pass up the immense productivity gains that the operating strategy offers, but it's just as problematic to remain incautious in your use of the phones and ignore the clear enterprise mobility management requirements.

Announcement of potential iOS 7 jailbreak reminder of security risks

  • December 23, 2013
  • Dan Ford

With the release of the Apple's iOS 7 months ago, many were excited for the new features that helped bring the operating system into a stronger position for BYOD use. Recently, though, some developers have figured out how to jailbreak the device, which may lead to greater temptations for employees who are operating outside of traditional MDM models.

With BYOD 'the new normal,' more potential for malware

  • December 20, 2013
  • Dan Ford

In this BYOD era we live in, there are any number of reasons for concern about the integrity and safety of your data. Mobile malware, while certainly a very real and very important threat, still has not yet risen to the level of concern that most have about desktops and the networks that connect them -  but as retrospectives look back at the year, it's clear that the rise in numbers is a very real concern.

Looking to the near future, important policies will still reign

  • December 11, 2013
  • Fixmo

Trend pieces are a common feature for those who work in technology, and predictions about the future are the normal province of research firms. In fact, it's really the basic territory of business - take a guess at what comes next, and try your best to stay ahead. No doubt, that's the case in BYOD, where risk management entails trying to stay one step ahead of the next trend.

Photostream

Recognition from leading industry publications

“Best Buy” Rating for Second Consecutive Year was awarded to Fixmo SafeZone

 

Download the Fixmo Security Compliance Guides

Learn how to meet DISA STIG requirements for mobile devices.

Request a Demo of Fixmo Products

Want to see how Fixmo products work? Click here to schedule a product demonstration