Developments in the local ICT sector are beginning to converge, signifying a major change for cloud computing, says KABELO MAKWANE, Managing Director of Accenture Cloud First...
Endpoint protection is one of the primary considerations for cybersecurity. There was a time when on-premise desktop computers were the only thing that had to be...
With the developments of technology and the rapid rate that employees are adapting to these, enterprises need to ensure that they are keeping up to date...
In order for a business to develop an effective BYOD policy, DONALD FARMER, VP of Innovation and Design at Qlik believes company owners need to first...
The BYOD evolution demands that organisations need to properly control information. This has resulted in a greater focus on implementing management tools that provide IT executives...
There is a global threat to the finance sector, and it’s not one that has to do with the stock market, bust cycles or a sudden...
Technology advances like the release of Android for Work and the growing maturity of enterprise mobile management (EMM) tools mean that bring your own device (BYOD)...
Companies need to start determining the impact BOYD plays on them and implement appropriate policies that would balance the security concerns, as well as their employees’...
Two new smartphones on the market show that even in the Bring Your Own Device era, there is still life left in phones geared towards the...
Cyber criminals are are turning more to connections inadvertently opened up by unsuspecting employees, making it more difficult for IT departments to control security, says ANDREW...