The Cyber Source blog

Cyber Security (and NOC Knowhow), in plain English

How to create a BYOD Security Policy in 9 simple steps

By Comtact January 10, 2018

With the rise and rise of BYOD devices, many companies have enjoyed the productivity benefits of..

Facing the mobile security threat - Mobile malware statistics 2017

By Comtact January 5, 2018

In the not too distant past, mobile security was not considered a security threat, or even an..

Creating a BYOD policy? 8 points every policy must contain

By Comtact December 5, 2017

Creating a well-considered BYOD policy (Bring Your Own Device) for your organisation's..

Google Device Policy vs. IBM MaaS360 Mobile Device Management

By Comtact December 4, 2017

With the growth in the use of mobile devices, securing and managing your organisation's mobile..

Is IBM MaaS360 with Watson changing the way we manage mobile devices?

By Comtact November 23, 2017

There are a number of mobile device management (MDM) platforms that enterprises all over the..

Sign-up for weekly updates

Recent Posts

Recent Posts