Grant McGregor Blog
Posts about

BYOD

How to ensure web applications used in your business are secure

How to ensure web applications used in your business are secure

What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...

Read More

The Importance of Online Backup for SMEs

The Importance of Online Backup for SMEs

The single best change you can make to your IT systems and processes this year? Investing in a suitable and effective backup solution for your business. If there is one thing we all learnt from the Travelex ransomware story in January, it’s that even some of world’s biggest organisations, dealing...

Read More

Are Your Websites and Applications Secure?

Are Your Websites and Applications Secure?

What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...

Read More

How to Address the Dangers of Personal Devices for Work

How to Address the Dangers of Personal Devices for Work

What happens when an employee downloads a virus onto one of their personal devices that you have allowed access your company systems? Grant McGregor takes a look at an emerging weak spot in many companies’ defences.

Read More

Don’t Rely on Ethics: Protecting Your Company When You Need to Let Someone Go

Don’t Rely on Ethics: Protecting Your Company When You Need to Let Someone Go

When it comes down to it, letting an employee go is never pleasant. Anger, confusion and even tears are all possibilities if the process isn’t well organised, professionally executed, and respectful to everyone involved.

Read More

How Mobilisation Can Help Empower Your Employees

How Mobilisation Can Help Empower Your Employees

The traditional employment model of jobs for life and a 9-5, Mon-Fri has undergone a major shake-up over the last couple of decades.

Read More

5 Things Every BYOD Policy Needs

5 Things Every BYOD Policy Needs

Bring Your Own Device (BYOD) policies are rapidly gaining traction in the modern workplace owing to the flexibility and convenience they provide to both employees and their employers.

Read More

Supporting Work Life Balance Through Technology

Supporting Work Life Balance Through Technology

Organisations in the UK have a legal obligation to consider employee requests to work flexibly.

Read More

Comparing the Advantages with the Pitfalls of BYOD

Comparing the Advantages with the Pitfalls of BYOD

Research from Gartner has shown that 39% of employees surveyed rely on personally owned mobile devices in the workplace. Use of corporate owned devices was minor in comparison – just 10%. There are of course obvious reasons for the decline of corporate devices – primarily being the high cost burden...

Read More

Your IT perimeter: where is it and how do you best defend it?

Your IT perimeter: where is it and how do you best defend it?

Gone are the days when the limits of your security cordon were the walls of the datacentre.  Now, it isn’t the stray floppy disk or errant memory stick we need to worry about – many of us are wondering where the limits of our IT perimeter are.

Read More

Categories

see all