Mastering endpoint security implementation
Endpoint protection or endpoint security interlocking gears
Security

Mastering endpoint security implementation

More devices connecting to the corporate network means more security risks. Here are some of the ways to protect your business
16 Apr 2021
What are employers' responsibilities when we use personal tech to work from home?
A desktop computer with wondows open on a desk with a keyboard and a cat sunbathing on a windowsill behind it
flexible working

What are employers' responsibilities when we use personal tech to work from home?

With many more months of lockdown ahead of us, and workers reluctant to return to the office full time, it's time to think about roles and responsibil…
25 Jan 2021
What is the 'personalisation of IT'?
A person checking their smartphone while typing on a laptop
Business strategy

What is the 'personalisation of IT'?

With millions of people using personal devices for professional purposes while working from home, consumerisation has entered a new phase
23 Jan 2021
What is BYOD?
A person checking their smartphone while typing on a laptop
Business strategy

What is BYOD?

We explain what Bring Your Own Device means and how to implement a successful company strategy
20 Jan 2021
Best MDM solutions 2020
A hand holding a modern smartphone over a laptop keyboard
mobile device management (MDM)

Best MDM solutions 2020

What are the best enterprise MDM tools available for securing your corporate devices?
20 Jan 2021
WhatsApp delays controversial privacy update for businesses
Someone holding a smartphone with the WhatsApp logo displayed on screen
privacy

WhatsApp delays controversial privacy update for businesses

Users were asked to share data with WhatsApp’s parent company Facebook in order to continue using the service
18 Jan 2021
Lenovo ThinkPad L14 review: It’s not right but it’s okay
Hardware

Lenovo ThinkPad L14 review: It’s not right but it’s okay

Pleasant enough for simple office tasks
9 Oct 2020
What is shadow IT?
Man holding mobile phone over laptop with double exposure city overlay
Security

What is shadow IT?

Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
29 Sep 2020
Android vs iOS: Which mobile OS is right for you?
Mobile

Android vs iOS: Which mobile OS is right for you?

We look at design, security, compatibility and more to see which OS best fits your business
17 Jul 2020
The consumerisation of IT continues apace – here’s how your business can benefit
Business strategy

The consumerisation of IT continues apace – here’s how your business can benefit

BYOD may be a fact of business, but there are still more ways organisations can grow by embracing consumer tech
30 Mar 2020
Achieving BYOD confidence
BYOD

Achieving BYOD confidence

The use of personal devices in the workplace has been by turns feared and welcomed. Over 10 years since the launch of the first iPhone, where do we st…
12 Mar 2020
How to create a mobile strategy in the age of 5G
Mobile

How to create a mobile strategy in the age of 5G

Despite the buzz around emerging network tech, BYOD continues to shine
5 Apr 2019
Should I let my staff choose their own kit and, if so, how?
BYOD

Should I let my staff choose their own kit and, if so, how?

By allowing your employees to specify which devices they use at work, you could end up saving money
16 Jul 2018
What is enterprise mobility?
Business strategy

What is enterprise mobility?

There’s more to mobility than making sure employees have a smartphone and a laptop
3 Oct 2017
How to protect against cyber threats
Security

How to protect against cyber threats

IT Pro looks at the four biggest enterprise cyber threats and how to protect against them...
8 Jun 2017
How can CIOs create the right mobile strategy?
Mobile

How can CIOs create the right mobile strategy?

Between BYOD, CYOD and emerging categories like wearables, IT leaders face new challenges — but there are also new opportunities
17 Jan 2017
BYOD has left businesses vulnerable, new research shows
Security

BYOD has left businesses vulnerable, new research shows

An increase in mobile working has left businesses with inadequate security policies vulnerable, a study reveals
2 Jul 2015
Android for Work review
Mobile

Android for Work review

Android for Work introduces some brilliant mobile device management features but feels rough around the edges
15 May 2015
Businesses told to purge staff smartphones for cybersecurity
Security

Businesses told to purge staff smartphones for cybersecurity

Businesses have been advised to get rid of staff smartphones to reduce risk of cyber attacks
19 Mar 2015
NHS trusts ‘risk data breaches by lacking BYOD policy’
NHS IT
BYOD

NHS trusts ‘risk data breaches by lacking BYOD policy’

NHS trusts don’t know what staff are using their devices for, reveals FoI request
9 Mar 2015
Lenovo: Chromebooks are winning over the enterprise
BYOD

Lenovo: Chromebooks are winning over the enterprise

Lenovo says no-one's doing BYOD, and Windows 8 has hurt Microsoft's device strategy
9 Feb 2015
What IT security lessons can teenagers teach the enterprise?
Kids using tablets and smartphones
Security

What IT security lessons can teenagers teach the enterprise?

Davey Winder looks a little closer to home to see how the enterprise can learn from his teenage son's approach to security...
19 Jan 2015
The guide to business mobility
Sponsored

The guide to business mobility

Want to get your business mobile? We've got the answers to all your questions
7 Jan 2015