You are here

Share
Posted by Paula Skokowski
If you want to appreciate the promise and the challenge of applying new technology to healthcare, look no further than the Healthcare Information and Management Systems Society (HIMSS). For over fifty years, HIMSS has sought to improve healthcare with information technology. Healthcare facilities...
Posted by Hormazd Romer
eDiscovery – the collection, identification, archivi ng , and delivery of Electronically Stored Information (ESI) requested by legal teams and courts as part of an investigation, litigation, audit, industry compliance or other activity – is an ongoing challenge for organizations,...
Posted by Yorgen Edholm
On Tuesday, October 6, 2015, the European Court of Justice, the highest court in the European Union, struck down the Safe Harbor agreement that enabled organizations, including leading tech companies such as Google and Facebook, to transfer personal data from Europe to the United States without...
Posted by Keith Poyser
Any American or European with a smartphone has access to a wealth of internet-enabled data and services: social media platforms, news and ecommerce websites, and mobile apps for everything from monitoring health metrics to ordering a car service downtown. Other capabilities include mobile banking,...
Posted by Paula Skokowski
Imagine that you are the Chief Security Officer for a large enterprise organization, and you discover a small TV crew working its way through your offices, panning a video camera back and forth, recording everything in sight: product schedules on white boards, financial reports lying about on desks...
Posted by Vidhya Ranganathan
Security researchers in Germany have discovered a flaw in the way that thousands of popular mobile apps store users' data online, making their passwords, addresses, door codes, location data, and other personal information vulnerable to a security breach. A joint research team from the...
Posted by Claire Galbois
The latest report from Ofcom , the UK communications regulator, has important news for every enterprise IT organisation: As of this year in the UK, the most popular device for accessing the Internet is the smartphone. Specifically, the 2015 Communications Market Report found that 33% of Internet...
Posted by Vidhya Ranganathan
These days, every IT conference seems to offer a custom mobile app with a built-in conference agenda, a list of attendees, a map of the exhibit hall, and perhaps a dedicated messaging service. Conference attendees download these apps all the time and leave them on their tablets and smartphones...
Posted by Paula Skokowski
Recent data breaches at lTarget, Sony and the U.S. Government's Office of Personnel Management have garnered considerable media attention. But sizable data breaches have taken place at other organizations, too. One industry that doesn't get a lot of attention is education, namely...
man working on the beach
Posted by Keith Poyser
Is your office ready for the dog days of summer? Long days, warm weather, the lure of travel, if only to a nearby park or beach—many employees naturally are thinking of escaping the office for time away. For the past year, since the passage of home working legislation in the UK , employees...
Posted by Hormazd Romer
We are thrilled to be positioned in the Leaders quadrant of the 2015 Gartner Magic Quadrant for Enterprise File Sync and Share (EFSS), for the second year in a row. A lot has changed in the EFSS market between 2014 and 2015. The space has gained more visibility, customers' needs have evolved,...
Man viewing content on tablet with a magnifying glass
Posted by Keith Poyser
Since the opening of Parliament, there has been plenty of questions raised over the Communications Data Bill, also known as the ‘Snooper’s Charter’, which would require phone and internet companies to maintain records of people’s internet, email and mobile phone activity,...
Person viewing mobile phone screen
Posted by Vidhya Ranganathan
Users of Android smartphones can protect content from an insidious new MMS hack by storing their content in kiteworks , Accellion’s secure mobile content platform. The new hack enables an attacker to take control of any Android smartphone simply by sending a text message to the smartphone...
Man accessing information on a mountain top.
Posted by Yorgen Edholm
We are pleased to announce that we have been positioned as a Leader in the Gartner Magic Quadrant for Enterprise File Synchronization and Sharing (EFSS) for the second year in a row. The EFSS market is a competitive and rapidly evolving landscape. It's marked by numerous offerings from a...
analyst viewing multiple computer screens
Posted by Vidhya Ranganathan
This week’s news that the head of Homeland Security and 28 senior staffers were using personal email on their Department of Homeland Security work computers , illustrates how lax many organizations are regarding allowing employees to mix personal communications with business. The DHS has...
Broken down office desk
Posted by Keith Poyser
The typewriter. The fax machine. Corded phones. Over the past few decades, technology has evolved, and, along the way, slower and cumbersome species of technology have become extinct. What’s on today’s endangered species list? The office desk and, along with it, our ideas of in-office...
Four individuals reviewing kiteworks BYOD solution on their mobile phones
Posted by Keith Poyser
It could be argued that BYOD is the cause of IT’s biggest headaches in the past 10 years, but there is no denying that BYOD has transformed the way we work, and for many organizations, there is no looking back. Mobile devices enable work to be done seemingly anywhere, anytime. Productivity...
Person holding up a kiteworks security lock
Posted by Paula Skokowski
Most Americans don’t think their personal data is safe. That’s the unmistakable conclusion of a recent Pew Research Center study of Americans’ attitudes about privacy, security, and surveillance. The study, based on surveys in 2014 and early 2015, found that: 93% of American...
Person viewing kiteworks on a tablet
Posted by Hormazd Romer
Chances are, your organization is using Dropbox for sharing and syncing files, regardless of whether or not your IT organization has approved Dropbox for official use. Dropbox is one of the most popular services in “shadow IT”—the products and services that employees adopt without...
View of mobile phone screen
Posted by Hormazd Romer
How many unsafe mobile apps—apps that could potentially spread malware or contribute to a sustained security attack—can be found on the typical enterprise network? 10? 20? 100? A new survey by Veracode reports that the number is even higher: 2,000. The typical enterprise network is...

Pages