Considering a Bring-Your-Own-Device (BYOD) Policy?

As more and more employees and companies use mobile devices for work, more organizations are facing the question of whether to use company-supplied devices or implement a bring-your-own-device (BYOD) policy. For those considering how to implement a BYOD policy, a recent article written by Daniel Hein offers a great explanation of the 6 BYOD assumptions [...]

2019-08-20T17:32:54+00:00August 6th, 2019|Mobile Device Management|

Mobile Device Management – What is it and how is it implemented?

Mobile Device Management (MDM) is simply a piece of software that allows your IT Staff to control a portion of your employee’s smartphone. No, it does not allow them to see your text messages or pictures. It does allow them to enforce policies for corporate information on smartphones and tablets. The purpose of MDM is to improve the [...]

2019-08-20T15:06:17+00:00July 23rd, 2019|Mobile Device Management|

Is Picking Out a Phone System Making Your Ears Hurt?

If you've been hearing about VoIP, Hosted, or Virtual phone systems and still have questions, you're not alone. Things have changed since the old phone systems that resided somewhere in the back of your office. Today, there are many more simple options for smaller businesses looking to increase their level of professionalism and availability. There [...]

Cybersecurity Tips for 2019: Security on the Move

Does your company have a mobile device management policy? According to Information Week, only 33% of companies in the US have a deployed solution. How should you begin to protect your data? In today’s business environment “bring your own device” (BYOD) is now common practice. The way people work has changed with cloud and mobility [...]

2019-03-12T14:47:47+00:00March 5th, 2019|Mobile Device Management, Mobility|

Mobile Device Management Plans

Do you know anyone who has had their cell phone stolen? At ACS we consider it critical that you have a mobile device management plan as part of your security plan. Consider this, most people's cell phones contain business-critical information including phone numbers, emails, or proposals as well as other sensitive business information. You wouldn't [...]

2019-03-12T17:13:47+00:00January 16th, 2018|Mobile Device Management, Mobility|