How to keep data safe in a BYOD era

Zack Nimtz

When employees can utilize their own mobile devices for work, they are often more productive. As a result, organizations are beginning to utilize them more as business tools by adopting cloud-based services and custom apps that foster productivity.

Unfortunately, the rise in the mobile workforce has also led to an increase in security risks. In August of this year, a report from Check Point Software found that mobile devices are the biggest point of vulnerability in any enterprise's cybersecurity efforts. In fact, the survey found that companies with more than 2,000 mobile devices, there is a 50 percent chance that at least six of them have been infected with some type of malware. Given that mobile workers are out and about, accessing company data from anywhere, business leaders are rightly concerned about the security of these devices.

Read More
Topics: Cloud Services, Bring Your Own Device, Mobile

3 easy strategies for implementing your BYOD policy

Zack Nimtz

Bring-your-own-device (BYOD) policies are becoming increasingly popular now that smartphones are becoming ubiquitous across the country and around the world. According to Pew Research, as of October 2014, 90 percent of American adults owned a cell phone and 64 percent owned a smartphone. By the same coin, tablets are helping propel small businesses and large firms alike to make the move to implementing BYOD.

The same Pew study found that 42 percent of American adults own a tablet computer. The benefits of BYOD, including saving money on IT infrastructure, increasing business intelligence and achieving higher levels of productivity among employees, are good reasons to look into implementing some sort of BYOD strategy.

Here are three ways your company can easily bring BYOD into the workplace:

Read More
Topics: Bring Your Own Device, ERP, Mobile

Five ways to improve your customer's experience using custom apps

Zack Nimtz

Mobility in this day and age is indispensable, and custom apps can be a great way for businesses to connect with their customers. A recent SalesForce study on mobile behavior found that smartphone users spend between 3-4 hours per day, primarily to email (91%), text (90%), and search the Internet (76%) - with social networking (75%) following closely behind.

Businesses have already begun to change their strategies to include SMS messaging, responsive web design, and optimized emails for smaller screens, but there is still a lag in adoption when it comes to custom business apps. Yet, despite slow adoption, consumers' cite "access to content any way they want" as the most important factor in a mobile experience according, to the study.

Providing customers with a custom app to connect with the business is not only beneficial for you, but also preferred by them. The ExactTarget study noted that 65 percent of those polled have downloaded business-specific apps for more convenient access to information. Of those who do use business-specific apps, 92 percent believe they are useful.

Read More
Topics: Bring Your Own Device, Development, Mobile

Understanding Mobilegeddon and how it may affect your business

Zack Nimtz

"Mobilegeddon" is a humorous term given to Google's latest algorithm update which is expected to seriously impact many SMB's search engine rankings. Starting April 21, 2015, Google's new Web search algorithm will favor mobile-friendly, or responsive websites, over their non-responsive competitors. Google has already begun labeling search results as "Mobile-friendly" for queries done on a mobile device.

So what does Mobilegeddon actually mean, and how should SMBs adjust their websites to comply with the algorithm changes so they can maintain their sites' current rankings?

Read More
Topics: Development, Mobile

Clinton email controversy sparks conversations about data security

Zack Nimtz

The recent controversy highlighting Hillary Clinton's use of personal email for work, and potentially put confidential government information at risk, has sparked conversations around the world about the importance of cyber security. Despite conflicting views and opinions about the controversy itself, one thing everyone can agree upon is that businesses, no matter what size they are, need to protect their confidential information from potential security threats.

"Hillary Clinton's use of a private email system rather than a government-run account while serving as Secretary of State has raised questions about what rules she may have broken, whether she knew she was in violation, and who else knew about her private system," wrote ABC News contributors Meghan Keneally, Liz Kreutz and Shushannah Walshe.

Read More
Topics: Bring Your Own Device, Managed Network Services, Network Security, Security, Mobile