BYOD
Android vs iOS: Which mobile OS is right for you?

Android vs iOS: Which mobile OS is right for you?
We look at design, security, compatibility and more to see which OS best fits your business
30 Nov 2022
Enabling secure hybrid learning in schools
Enabling secure hybrid learning in schools
The importance of creating security awareness among key players
11 Nov 2022
Mastering endpoint security implementation

Mastering endpoint security implementation
More devices connecting to the corporate network means more security risks. Here are some of the ways to protect your business
18 May 2022
Rebooting your BYOD strategy

Rebooting your BYOD strategy
With hybrid working becoming the norm, there's a need for a device management overhaul. What does BYOD 2.0 look like?
10 Feb 2022
Best MDM solutions 2022

Best MDM solutions 2022
What are the best enterprise MDM solutions available for securing your corporate devices?
12 Nov 2021
What is BYOD?

What is BYOD?
We explain what Bring Your Own Device means and how to implement a successful company strategy
26 Jul 2021
IT Pro Panel: Why BYOD is (sort of) here to stay

IT Pro Panel: Why BYOD is (sort of) here to stay
CIOs explain why they aren’t going all-in on personal devices
31 May 2021
The IT Pro Podcast: Should companies spy on their employees?

The IT Pro Podcast: Should companies spy on their employees?
Where’s the line between security and surveillance?
7 May 2021
What are employers' responsibilities when we use personal tech to work from home?

What are employers' responsibilities when we use personal tech to work from home?
With many more months of lockdown ahead of us, and workers reluctant to return to the office full time, it's time to think about roles and responsibil…
25 Jan 2021
What is the 'personalisation of IT'?

What is the 'personalisation of IT'?
With millions of people using personal devices for professional purposes while working from home, consumerisation has entered a new phase
23 Jan 2021
WhatsApp delays controversial privacy update for businesses

WhatsApp delays controversial privacy update for businesses
Users were asked to share data with WhatsApp’s parent company Facebook in order to continue using the service
18 Jan 2021
Lenovo ThinkPad L14 review: It’s not right but it’s okay

Lenovo ThinkPad L14 review: It’s not right but it’s okay
Pleasant enough for simple office tasks
9 Oct 2020
What is shadow IT?

What is shadow IT?
Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
29 Sep 2020
The consumerisation of IT continues apace – here’s how your business can benefit

The consumerisation of IT continues apace – here’s how your business can benefit
BYOD may be a fact of business, but there are still more ways organisations can grow by embracing consumer tech
30 Mar 2020
Achieving BYOD confidence

Achieving BYOD confidence
The use of personal devices in the workplace has been by turns feared and welcomed. Over 10 years since the launch of the first iPhone, where do we st…
12 Mar 2020
How to create a mobile strategy in the age of 5G

How to create a mobile strategy in the age of 5G
Despite the buzz around emerging network tech, BYOD continues to shine
5 Apr 2019
Should I let my staff choose their own kit and, if so, how?

Should I let my staff choose their own kit and, if so, how?
By allowing your employees to specify which devices they use at work, you could end up saving money
16 Jul 2018
What is enterprise mobility?

What is enterprise mobility?
There’s more to mobility than making sure employees have a smartphone and a laptop
3 Oct 2017
How to protect against cyber threats

How to protect against cyber threats
IT Pro looks at the four biggest enterprise cyber threats and how to protect against them...
8 Jun 2017
How can CIOs create the right mobile strategy?

How can CIOs create the right mobile strategy?
Between BYOD, CYOD and emerging categories like wearables, IT leaders face new challenges — but there are also new opportunities
17 Jan 2017
BYOD has left businesses vulnerable, new research shows

BYOD has left businesses vulnerable, new research shows
An increase in mobile working has left businesses with inadequate security policies vulnerable, a study reveals
2 Jul 2015
Android for Work review

Android for Work review
Android for Work introduces some brilliant mobile device management features but feels rough around the edges
15 May 2015
Businesses told to purge staff smartphones for cybersecurity

Businesses told to purge staff smartphones for cybersecurity
Businesses have been advised to get rid of staff smartphones to reduce risk of cyber attacks
19 Mar 2015