Archive for the ‘Mobile’ Category

Atiba Adds Seasoned Technology Pro, Jud Baldock

By WillD|April 24th,2014|Atiba Behind the Scenes,Client Services,Connectivity,Disaster Recovery,IT,Lync,Managed Services,Mobile,Security,SharePoint,Unified Communications|No comments

Atiba continues to see expansion in the use of scalable and virtualized networks, team collaboration, and sophisticated business intelligence throughout the Southeast. To meet these growing needs, we’re proud to add Jud Baldock as Senior Systems Analyst to the team.

Businesses now have a wider variety of effective network solutions to choose from:  “Sophisticated network services lay the foundation for a successful business today. From secure and scalable hosting, cloud computing, efficient team collaboration tools, and world-class business intelligence and “big data” management: we are working with our clients to establish strong frameworks to prepare them for future growth and fortitude.  Our newest member to the team, Jud Baldock, helps to implement these strategies.  Jud is a Nashville native, with deep roots in the IT community here, having led IT initiatives for Williamson County Schools for 11 years as well as working at Dell and HCA.  We are excited to have Jud on board to partner with our clients and help their businesses thrive.” said Ricardo Anders, President of Atiba Network Services.

Jud has a M.S. in Information Technology Management and B.A., both from Lipscomb University.  He is also a Microsoft Certified Systems Engineer and brings a well-rounded background to the Atiba team.

Jud and Atiba consultants are “half geek, half human” enabling them to translate real business needs into engaging solutions. For more information or to speak directly to a consultant, please call (615) 353-1921, ext. 203.

Continue Reading

 

5 Tips To Keep Your Mobile Data Safe and Secure

By WillD|August 11th,2013|Mobile,Security|No comments

by JJ Rosen

Remember the classic old-school wallet chains? There are still a few around. The idea was to keep your wallet protected from would-be thieves with a chain attached between your wallet and belt loop.

Today, although it’s bad to have the contents of your wallet stolen, having the contents of your smartphone stolen is even worse. And unfortunately, the “wallet-chain approach” will not help — a thief does not even have to physically steal your smartphone or tablet to get its contents. Unlike your wallet, a mobile device’s contents can be swiped wirelessly via viruses and hacks, creating additional opportunities for cybercriminals to steal your sensitive information.

From both a personal and business perspective, our mobile devices are central information stores containing confidential information on whom we communicate with, what we say, where we go and what we buy. Theft of your mobile device’s contents, either physically or electronically, can have dire consequences. Aside from the risk of identity theft, most of us have all kinds of confidential business data buried in emails and documents stored on our mobile devices, exposing us to significant impact from theft.

Given that mobile devices are in many cases supplanting laptops, it’s safe to assume that more and more confidential data will be placed on our mobile devices.

The best cybersecurity starts with proactively managing risks without hindering productivity.

There are some important best practices to follow when it comes to your smartphone and tablet that will allow you to balance the productivity gains of having your important data in the palm of your hand with keeping that information secure.

Here are five tips to keep your mobile data safe and secure:

• Turn your home screen password on. About three in 10 mobile device users are not using any password at all. The first step in mobile device security is activating the password feature of your device. Any password is better than none, but depending on your device, ideally use a password rather than a PIN and make sure it’s not easy to guess.

• Install a mobile security app. The newest security apps include virus protection, remote lock and erase capabilities, lost-phone finders and privacy protection features that can keep your data safe. Check out Lookout for Android platforms and Find My iPhone for iOS platforms.

• Be cautious when using public Wi-Fi. If you don’t have a secure connection, avoid doing any online banking or shopping, and be careful not to access any websites or corporate resources that require you to log in with a password. Investigate using a VPN (Virtual Private Network) on your mobile device to keep your connection secure.

• Keep your device up to date with the latest patches. Most phone/tablet updates address security vulnerabilities, so it is important to always accept and install them and be proactive by making sure your device is running the latest and greatest operating system.

• Keep your phone out of jail. “Jailbreaking” and “rooting” are techniques some users leverage to bypass a device’s limitations. This also bypasses many of the device’s security features, making your data more vulnerable to theft.

With any computer-based system, there is always a trade-off between security and productivity. Proactively following these basic tips will allow you to use your mobile device the same way you use your laptop while keeping your data safe.

Call/Email Atiba Network Services  today to discuss your Mobile Security 615-353-1921 ext 200  |  network@atiba.com 

Tags:

Continue Reading

 

Mobile Devices Present Challenges for Employers

By WillD|August 10th,2013|IT,Mobile|No comments

Your phone is having an identity crisis.

Not unlike us humans, our smartphones (and for that matter, all of our mobile devices) are swamped juggling both our work and personal lives. This is presenting some interesting challenges for employers and employees alike.

Multiple research reports show that almost 70 percent of employees use their personal smartphones and tablets to access corporate data and applications. Despite resistance from IT departments, Bring Your Own Device (BYOD) is clearly what employees want, allowing them to manage work, home and fun on their personally owned mobile devices.

From the employer side, BYOD has both pros and cons. On the upside, employers can save tons of money on mobile hardware and services while enhancing productivity by giving employees the convenience to work more from anywhere at any time. However, this productivity boost and savings comes at the expense of security and control. Allowing personally owned devices on multiple platforms (iOS, Android, Windows Phone) to access corporate networks and data can be a security, operational and, in some cases, compliance nightmare.

So what is a CIO or any business owner to do?

One popular way to manage company mobile devices is to implement Mobile Device Management software (MDM). MDM allows a company to manage all aspects of an employee’s mobile device remotely. While this is a great option for company-owned devices, it can be a bit awkward and downright intrusive on employee-owned devices.

Fortunately, there is a new breed of tools coming out that support a hybrid approach, keeping both employees and employers happy with respect to the BYOD movement. This new approach focuses on managing and securing just the applications and data on your phone rather than the phone itself. So instead of your IT department managing your entire device, it is able to manage only the applications and data that the company really cares about.

There is little need for a company to manage your Words with Friends app in order to allow you to use corporate email or SharePoint or work on a spreadsheet on the company’s network. Look for these new Mobile Application Management solutions (MAMs) to make the BYOD approach increasingly popular over the next couple of years.

While there is no current market leader or industry standard in the BYOD market, major players like Symantec, AirWatch, Citrix and many other smaller companies are all vying to establish a foothold around BYOD. This competition will eventually create a win-win for employees and employers by solving the unique challenges of your phone’s identity crisis in the workplace.

Give us a call today to discuss MDM solutions for your business: 615-353-1921 ext 200

Tags:

Continue Reading