The Top 3 Questions Asked About iOS 7
The most popular mobile OS received its single biggest facelift this year with the release of iOS 7 in September. Apple® introduced a plethora of new features to go along with the completely redesigned...
View ArticleSymantec’s new Enterprise Solution plugs security holes. Here’s how.
Product licensing, coupled with a licensing scheme that lacks uniformity and consistency, creates security gaps you may not notice right away. Symantec aims to solve that problem by offering the...
View ArticleWhat Apple’s Device Enrollment Program is, and what it means for IT
Softchoice is pleased to be one of the first Authorized Resellers in North America to support Apple’s Device Enrollrment Program. The Device Enrollment Program (DEP) provides a fast, streamlined way to...
View Article3 ways you’ve been underestimating Box
The last few years have seen businesses bombarded with various cloud-based storage and sharing solutions. It’s come to a point where many free file sharing providers offer nearly-identical services –...
View ArticleThe 5 stages of a malware attack (and what to do next)
It takes less than half a second for a user to unknowingly infect your network. In this blog post we cover the five stages of a malware attack, and how to analyze your environment for complete...
View ArticleMobile device management is easier with Symantec
Gone are the days when everyone was armed with a company-issued Blackberry that could easily be managed through the Blackberry Enterprise Server. These days, consumerization of IT is a trend that’s...
View ArticleManaging and securing iPads in one easy lesson [Apple]
Tablets are de rigueur in the offices everywhere with executives and gadget junkies alike sizing up their options for tablets. However, with all the hoopla has also been a lot of debate about the...
View ArticleThe 3 Biggest Threats to Digital Security In the Years Ahead [Sophos]
Defending against cyber-attacks from every direction demands a solid line of defense. As the availability of commercial tools makes launching cyber-attacks easier than ever, cyber-criminals are...
View ArticleMobile Devices Are Flooding The Office – Can You Rise Above It? [Cisco]
By 2015, more than 10 billion WIFI-enabled devices will enter the market. Many of them will find their way into office buildings, changing employee habits and the way we work, as more and more users...
View ArticleSecurity In A New Mobile World [Trend Micro]
In case you missed it, Smartphones and other mobile devices overtook traditional PCs in sales back in 2010. How did this happen? There are a whole host of factors at play. Foremost among them has been...
View ArticleTime Is Tight And Risks Are High – Which Is Why Endpoint Management Is So...
With expansion happening faster than IT budgets are able to keep pace, the buzzword on everyone’s lips is “efficiency”. As an IT manager, your time and resources are in short supply. The BYOD...
View ArticlePut Some ISE On Those BYOD Security Pains [Cisco]
There’s no denying it: employee-owned mobile devices, with frequent off-site network access, are the new normal for the next generation of workers. Although adoption of BYOD programs is steadily...
View Article5 Reasons Why Businesses Need To Look Seriously At BES 10
Considering BlackBerry out of the game is like saying you won’t drink water out of your tap now knowing that Coke exists. If you are interested in securely managing data on your smartphones and...
View ArticleSecurity for Your BYOD Environment in 3 Simple Steps [Cisco]
This post is for IT folks who would like to understand the minimum steps required to secure their network in an age where so many devices are attempting to connect to your network. An earlier post...
View Article3 Surprising Ways the Mac Improves Enterprise Collaboration
Gone are the days where employees blindly accept their corporate-issued PC. A Forrester report stated that many high-ranking employees prefer the Mac®, as “most of the Macs today are being freewheeled...
View ArticleThe Top 3 Questions Asked About Mac OS X Mavericks
When Apple® introduced the new MacBook Pro® with Retina® display late in October, they also unveiled the latest version of Mac® OS X® operation system, Mavericks. With over 200 new features it quickly...
View ArticleBlackBerry: Leading the competition in mobile security
BlackBerry is about more than just handheld devices. The hot topic among CIOs is—and always has been—security. As tech news continues to be overrun by endless data breaches, hackers and privacy...
View Article