BYOD vs. CYOD: What Mobile Device Policy Is Ideal for Your Connecticut Company?

By Tom McDonald | Nov 22, 2017 9:00:00 AM

Mobile devices have become an integral part of corporate computing. More Connecticut workers are using smartphones, tablets, and laptops in the office, for telecommuting and when they travel, and companies are embracing these portable devices to boost productivity. At the same time, CIOs, CTOs, and CSOs have to make strategic decisions about the best way to manage mobile computing devices. Is it better to let employees use their own smartphones and tablets, or is company-issued hardware a better strategy? Which is better for your Connecticut company—bring your own device (BYOD) or choose your own device (CYOD)?

Read More >

URGENT SECURITY ALERT: Apple iPhone, iPad, Mac

By Tom McDonald | Feb 23, 2014 5:15:00 PM

AVOID public wifi until you have performed the latest iOS update. Protect yourself from potential security issues aimed at Apple Mac, iPhone, iPad.  NSI Senior Support Consultant explains: 

"There isn't much buzz about it yet as it is mostly only the hacker/security community that knows of this today, but there was a MAJOR security vulnerability that was just made public that affects almost all apple devices.

Read More >

Survey Results - How are business owners handling MOBILE DEVICES?

By Tom McDonald | Jun 26, 2013 11:50:00 AM

How are small businesses handling Mobile Devices?  We know that business owners rely on their mobile technology more than ever, because we see these trends when we review the types of calls received by our Help Desk. When NSI TotalCare added its robust service offering designed specifically for Mobile Devices, it was in response to feedback and requests of our clients, who expressed a need for this kind of support. Policies, management, security, data backup and best practices alone are a lot for a business owner to handle, not to mention the variety of user issues, questions, and continued operating system upgrades required to keep each device up to speed. 

Read More >

Mobile Device Vulnerable? Protect IT! 5 Steps to Smartphone Security

By Tom McDonald | Apr 3, 2013 12:16:00 PM

Smartphone Security:  The single, easiest portal into your professional and personal life is also the last thing you would think of protecting.  Take a look at the list below, and take action – Do it today:

 

Read More >