by admin | Sep 8, 2022 | Blog, Business Continuity, BYOD, Cyber security
Two-factor authentication (2FA) has strengthened network security significantly and is now used by company networks and many leading platforms. 2FA is seen as an extra layer of security to help boost that of usernames and passwords. It is used across enterprise to...
by admin | Aug 31, 2022 | Blog, BYOD, Cyber security
You have very probably heard a lot about the two vulnerabilities to Apple devices over the past couple of weeks, but did you consider how it would affect BYOD? If your company has a Bring Your Own Device (BYOD) policy and have iPhones, iPads or Macs using your...
by admin | Jan 18, 2022 | Blog, Business Continuity, BYOD
If your teams are working from home thanks to omicron, the National Cyber Security Centre released a blog post outlining best practices for companies that allow bring your own device. With the rise of the omicron variant and a renewed recommendation to work from home...