Mobile menu
A recent enterprise mobility survey commissioned by Oracle found that mobile-related IT expenses are expected to grow by more than 50 percent in two years. Unfortunately, security and integration remain issues of concern. Survey respondents included 414 IT management executives from around the world, including CIOs, CTOs, senior vice presidents or vice presidents, directors or managers of IT, and senior IT professionals. What were the survey findings? - 93% of respondents expressed concern for data security corresponding with mobile devices, citing BYOD as the main contributor - Average IT department spending, per device, per employee (currently $157) is expected to increase 54% (projected $242) in the next two years - Although a majority of mobile spending is allocated toward front-end mobile app development, more than 70% of enterprise time is spent on integration, security, quality assurance testing and design work - In the next two years, respondents say their organizations will be focusing 11% more on remote data erasure and destruction compared to today While the Oracle-sponsored survey shows enterprise commitment to the rise in mobility, development, deployment and spending support, the survey also revealed flaws and increasing concern for mobile security and device management. Enterprise mobility as a whole, Oracle feels is unmatched by any other recent technological movement. In another recent survey of IT managers, nearly half agree to either plan to outsource mobile management or have already done so. A CIO at one company told surveyors why he would outsource mobile management: “Mobile Ops are completely different from keeping servers up and running,” the CIO says. “If it were just app support, we could probably handle it…” With the assistance of an outsourced mobile management program, the CIO is finally getting insight on company spending on mobility and how employees use their devices, giving the ability to monitor costs and support incidents. As mobility and BYOD progress in the office, companies cannot rely solely on their IT department for management and data security. MobileLife Fortune 500 companies assign on average 3.5 devices per employee and 51% of organizations have had data loss due to insecure devices. on the other hand, has had zero data leaks in its entire company history. Mobile lifecycle management program, MobileLife, includes repair service, reverse logistics solutions that ensures the disposition of corporate electronic equipment, the planning of the physical removal from the premises, data erasure/destruction, and a disposition plan that meets the overall objectives of the corporation. Deployment Repair Services Swap Stock Inventory Reverse Logistics Data Erasure Compliance Remarketing & Resale Recycling Mobility is essential for companies, and choosing the right mobile management program is vital for data security and extending the lifecycle of mobile assets.
eBay will have to answer to government officials over its recent data breach. The online auction site revealed Wednesday that hackers had penetrated its corporate network and compromised the credentials of its users. As a result, the company has urged all users of the site to change their passwords. Reacting to the news, the attorneys general of Connecticut, Florida, and Illinois will launch a joint investigation, Jaclyn Falkowski, a spokeswoman for Connecticut Attorney General George Jepsen, told CNET.

AdWords click fraud

Tuesday, 20 May 2014 13:29 Written by

Anyone else getting malicious clicks ? Daily I get adwords clicks from a search like " computer repair" with an IP address that comes from within Google's network. it's one click on an ad to get to the site and then gone. It happens at different times during the day & night, but its one click a day... every day. I contacted adwords support and since the IPs resolve back to Google's network, I'm not getting charged for it. But if the attacker got smarter and started spoofing an IP in the wild then I might actually start getting charged. So I figured I'd ask around and find out if anyone else has a similar problem and if so... how are they resolving this type of issue?"

How Companies Should Dispose of Their E-Waste

Tuesday, 20 May 2014 13:26 Written by

Companies across the world are increasingly reliant on electronic devices. Cutting edge technology puts businesses ahead of their competitors, in a marketplace which is ever more competitive. However, when it can cost significantly more money to repair a device than to simply purchase a new replacement, many of these old and superseded devices end up in landfill. Electronic or ‘e’ waste products and their disposal is becoming one of the most significant areas of waste management in America, growing at a rapid rate. According to some studies, e-waste is currently 2% of the total waste stream in America – a proportion which is steadily increasing. More importantly, that 2% creates an estimated 70% of the

Fake Windows tech support calls continue to plague consumers

More than a year after the FTC heralded a major crackdown on fraudsters posing as Microsoft technical support personnel, consumers continue to receive calls from scammers.

Take this test!

Put a name to the clear and present cybercrime danger that:

Deliberately preys on users who are less well informed or prepared than average.

Messes around with your data.

Blackmails you into paying about $300.

Makes you wonder if the crooks will be back, and if so, when?

You might be thinking, "CryptoLocker," but I'm talking about crookery that is in many ways much worse: fake support call scams.

There are several possible problems with your request. Here are the challenges you face, as I see them:

1. Multiple infection vectors, including e-mail attachments, various phishing messages, infected web sites, infection via botnet, and unsolicited phone calls claiming to be from Microsoft or some other legitimate vendor

2. The ever-changing nature of the threats and methods of infecting the end user's computer and/or hacking into it

3. The wide range of software tools aimed at preventing infections and corresponding differences of opinion on which ones to use; these opinions may be influenced by commercial considerations, i.e. which products you are selling

4. All of the issues related to passwords, their relative strength, and how often they are changed, plus the question of using different passwords for every account and every web site to be accessed

Two million log-ins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed "Pony."

Another company whose users' log-in credentials showed up on the server was ADP, which specializes in payroll and human resources software, wrote Daniel Chechik, a security researcher with Trustwave's SpiderLabs.

[ Security expert Roger A. Grimes offers a guided tour of the latest threats and explains what you can do to stop them in InfoWorld's "Fight Today's Malware" Shop Talk video and Malware Deep Dive Report. | Learn how to secure your systems with InfoWorld's Security Central newsletter. ]

It's expected that cybercriminals will go after main online services, but "payroll services accounts could actually have direct financial repercussions," he wrote.


Tuesday, 20 May 2014 13:06 Written by

SPOTLIGHT Samsung Partners Concerned About Mobile Network Knockout Samsung partners say they wants answers from the corporate behemoth on why a data center fire took down smartphone and tablet services for several hours. INDUSTRY NEWS CEO Tim Cook: 'Great Things' Are Coming From Apple Apple CEO Tim Cook said that he is very exicted about the great things that Apple is working on as it moves to deliver on its promise to continue to deliver "insanely great" products to customers. small article imagesmall spacePartners: Nokia Name Change Shows Nadella Serious About Making Smartphone Gains Microsoft partners say they are heartened by new CEO Satya Nadella's to put all the company's brand

ATTENTION: Microsoft recently announced discovery of a software security vulnerability that affects any user of its browser Internet Explorer, versions 6 thru 11. Until Microsoft has fixed the vulnerability, we recommend the use of a current version of an alternate browser, such as Google Chrome, Firefox or Safari. Hackers targeting newly discovered flaw in Internet Explorer Alternative Web browser Firefox Nightly

Partners Database

  • acer.jpg
  • asus.png
  • cisc0.jpg
  • Dell-Logo.jpg
  • emc.jpg
  • hp.png
  • IBM.jpg
  • intel-inside.jpg
  • lexmark.jpg
  • microsoft.jpg
  • ms.png
  • nase.png
  • toshiba.jpg
  • zomdo.png