BYOD
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
-1
archive,paged,tag,tag-byod,tag-222,paged-2,tag-paged-2,wp-theme-stockholm,wp-child-theme-hojtcom,stockholm-core-2.4.9,select-child-theme-ver-1.0.0,select-theme-ver-9.14.4,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-8.7.2,vc_responsive

iPhone passwords for work are a giant pain in the rear, workers say

The barrier between work use and personal use has vanished. Source: mashable.com A BYOD program is necessary, but if it means too complicated and irritating mechanisms it will not be used. People will take shortcuts to be able to do their job as effectively as possible. Chose

7 security threats that go ignored too often

From unencrypted email to open Wi-Fi to faulty firewalls, these common security threats are actually easy to fix, but most often go overlooked. In combination, these threats could easily be giving away the entire farm. Source: www.networkworld.com Or to sum up; the new connected world with mobiles,

BYOD and cloud are top data breaches and malware risks, survey shows

With the influx of personal devices in the workplace and the unprecedented risk of data breach and malware, tightening IT security at a company can seem like a daunting task. Just how difficult of a task is it? Source: www.cio.com The IT world needs a mind shift, in

IBM: Mobile app security stinks

An IBM/Ponemon study released today found large companies, including many in the Fortune 500 aren’t properly securing mobile apps they build for customers nor their corporate and BYOD mobile devices. Source: www.cio.com Train developers so they understand what secure coding really means, so they understand their ethical

BYOD: Why the biggest security worry is the fool within rather than the enemy without | ZDNet

http://pingpal.io/pingcom/ping-content/uploads/2014/10/0cb17a29-15c8-4ffa-9406-065cac1cfc70.jpg While IT departments are geared to scouring the internet for potential threats the biggest issue they see is the careless employee with mobile devices. Source: www.zdnet.com “For tech professionals the biggest concern over IT security is lost or stolen information (82 percent) followed by

Loading new posts...
No more posts
Hojt Digital
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.