Author: Absolute

Control the Rise in Shadow IT Post-Christmas

Millions of new devices have been bought and activated over the holidays. We saw that 2015 Black Friday sales showed some of the highest increases in new device activations for the iPad mini and a number of smartphones, with Apple product activations topping those in 2014. With Christmas now behind us, we’ll see an even larger spike in new device activations for all the tablet, smartphone and laptops gifted this holiday season.

Read More

Predictions for Data on the Endpoint in 2016

We recently took a look back at our Predictions for Mobile in 2015, looking at how our predictions panned out for the year. Overall, we saw a marked shift toward understanding the complexities of how people and endpoint devices put data at risk. As a new year approaches, we expect that organizations will continue to face data security challenges with the endpoint as one of the greatest threats to corporate data.

Read More

A Look Back at Predictions for Mobile in 2015

For the past several years, we have created Predictions for Mobile for the year ahead. Before we look forward to 2016, let’s first look back at 2015 and see where we stand. In late 2014, our Predictions for Mobile in 2015 projected a shifting perception of the need for data-based security, which indeed has intensified throughout the year with added pressures and risks now associated with endpoint devices.

Read More

BYOD Still Remains Unchecked

One of the largest data security risks for most organizations continues to be mobile devices. Each employee may have 3 or 4 endpoint devices – smartphones, tablets, laptops – which are connecting to the corporate network or contain sensitive data. Many of these devices are personally-owned, and whether supported by an official BYOD policy or not, these devices are increasing the potential points of ingress for cyber criminals. Given the scope of the threat, one would expect that managing the endpoint would receive greater priority within IT security, but data indicates even basic precautions are still being overlooked.

Read More

Shadow IT: A Growing Threat You Can’t Ignore

Shadow IT, the use of technology systems and solutions without the explicit approval of the organization, can no longer be swept under the table and ignored. Nor should it be applauded, for while employees are showing initiative in embracing apps and technologies to improve their productivity, they do so by putting corporate data at risk. Shadow IT is happening right now in your organization, you just don’t know it. Your data is at risk, or could even be breached already, and you don’t know it. At least not yet.

Read More