You are here

Share
Posted by Vidhya Ranganathan
Security researchers in Germany have discovered a flaw in the way that thousands of popular mobile apps store users' data online, making their passwords, addresses, door codes, location data, and other personal information vulnerable to a security breach. A joint research team from the...
Posted by Claire Galbois
The latest report from Ofcom , the UK communications regulator, has important news for every enterprise IT organisation: As of this year in the UK, the most popular device for accessing the Internet is the smartphone. Specifically, the 2015 Communications Market Report found that 33% of Internet...
Posted by Vidhya Ranganathan
These days, every IT conference seems to offer a custom mobile app with a built-in conference agenda, a list of attendees, a map of the exhibit hall, and perhaps a dedicated messaging service. Conference attendees download these apps all the time and leave them on their tablets and smartphones...
Posted by Paula Skokowski
Recent data breaches at lTarget, Sony and the U.S. Government's Office of Personnel Management have garnered considerable media attention. But sizable data breaches have taken place at other organizations, too. One industry that doesn't get a lot of attention is education, namely...
man working on the beach
Posted by Keith Poyser
Is your office ready for the dog days of summer? Long days, warm weather, the lure of travel, if only to a nearby park or beach—many employees naturally are thinking of escaping the office for time away. For the past year, since the passage of home working legislation in the UK , employees...
Posted by Hormazd Romer
We are thrilled to be positioned in the Leaders quadrant of the 2015 Gartner Magic Quadrant for Enterprise File Sync and Share (EFSS), for the second year in a row. A lot has changed in the EFSS market between 2014 and 2015. The space has gained more visibility, customers' needs have evolved,...
Man viewing content on tablet with a magnifying glass
Posted by Keith Poyser
Since the opening of Parliament, there has been plenty of questions raised over the Communications Data Bill, also known as the ‘Snooper’s Charter’, which would require phone and internet companies to maintain records of people’s internet, email and mobile phone activity,...
Person viewing mobile phone screen
Posted by Vidhya Ranganathan
Users of Android smartphones can protect content from an insidious new MMS hack by storing their content in kiteworks , Accellion’s secure mobile content platform. The new hack enables an attacker to take control of any Android smartphone simply by sending a text message to the smartphone...
Man accessing information on a mountain top.
Posted by Yorgen Edholm
We are pleased to announce that we have been positioned as a Leader in the Gartner Magic Quadrant for Enterprise File Synchronization and Sharing (EFSS) for the second year in a row. The EFSS market is a competitive and rapidly evolving landscape. It's marked by numerous offerings from a...
analyst viewing multiple computer screens
Posted by Vidhya Ranganathan
This week’s news that the head of Homeland Security and 28 senior staffers were using personal email on their Department of Homeland Security work computers , illustrates how lax many organizations are regarding allowing employees to mix personal communications with business. The DHS has...
Broken down office desk
Posted by Keith Poyser
The typewriter. The fax machine. Corded phones. Over the past few decades, technology has evolved, and, along the way, slower and cumbersome species of technology have become extinct. What’s on today’s endangered species list? The office desk and, along with it, our ideas of in-office...
Four individuals reviewing kiteworks BYOD solution on their mobile phones
Posted by Keith Poyser
It could be argued that BYOD is the cause of IT’s biggest headaches in the past 10 years, but there is no denying that BYOD has transformed the way we work, and for many organizations, there is no looking back. Mobile devices enable work to be done seemingly anywhere, anytime. Productivity...
Person holding up a kiteworks security lock
Posted by Paula Skokowski
Most Americans don’t think their personal data is safe. That’s the unmistakable conclusion of a recent Pew Research Center study of Americans’ attitudes about privacy, security, and surveillance. The study, based on surveys in 2014 and early 2015, found that: 93% of American...
Person viewing kiteworks on a tablet
Posted by Hormazd Romer
Chances are, your organization is using Dropbox for sharing and syncing files, regardless of whether or not your IT organization has approved Dropbox for official use. Dropbox is one of the most popular services in “shadow IT”—the products and services that employees adopt without...
View of mobile phone screen
Posted by Hormazd Romer
How many unsafe mobile apps—apps that could potentially spread malware or contribute to a sustained security attack—can be found on the typical enterprise network? 10? 20? 100? A new survey by Veracode reports that the number is even higher: 2,000. The typical enterprise network is...
Man viewing content on mobile device
Posted by Yorgen Edholm
Mobile users prefer by a wide margin native apps written to run specifically on mobile operating systems such as Android or iOS, to browser-based apps, according to a recent survey by mobile analytics firm, Flurry. On average, mobile users are spending almost three hours a day on their devices, and...
Three security icons
Posted by Vidhya Ranganathan
Enterprise organizations interested in developing their own mobile apps would benefit from reading HP Security Research’s new Cyber Risk Report 2015 . The report presents an in-depth look at enterprise IT security overall, and like other security reports, it calls attention to the threat of...
Pilot viewing kiteworks app on tablet
Posted by Paula Skokowski
It seems there’s an app for just about everything these days, including apps to improve our exercise regimes, our restaurant choices, our driving routes, and even our relationships. In July of 2014, Android users had 1.3 million apps available for download; Apple users, 1.2 million, and those...
Person holding phone showing security lock
Posted by Vidhya Ranganathan
Hackers are increasingly targeting mobile devices, according to a recent report from RSA. As the company’s Daniel Cohen remarked in an interview at BankInfoSecurity.com , the sheer number of smartphones and tablets all but guarantees that hackers will target these popular devices. The growth...
View of laptops, tablets and mobile phones
Posted by Yorgen Edholm
The BYOD trend is unstoppable and enterprises are now living in a BYOD-centered world. A mobile workforce of tech-savvy employees is now storing mission-critical business documents on their own devices, ranging from laptops to smartphones to smart watches. Because of this, enterprise apps are...

Pages