Grant McGregor Blog
Posts about

mobile device management

Simple tips for managing web browser security

Simple tips for managing web browser security

Most people within your organisation will use at least one web browser. They are ubiquitous. Some will use them to access essential business apps. Some will be using them to access webmail accounts. Others will use them simply to browse the Internet. Yet web browsers are amongst the most insecure...

Read More

Our review of the biggest tech stories of 2021

Our review of the biggest tech stories of 2021

What were the tech stories that got us all talking during the last twelve months? The Grant McGregor team looks back at some of the technology tales and IT intelligence that made headlines in 2021. #1. Poor practices put users at risk In May, security experts(1) revealed that more than 100 million...

Read More

IT Pro with MDM

IT Pro with MDM

Have you got a way to monitor the devices that access your data and applications on your network? How do you spot nefarious activity on the network? If you can’t answer either of these questions, this blog is for you. We’ll tell you about a quick, easy and low-fuss way to solve these problems....

Read More

The new security threats

The new security threats

As 2020 gets well underway, the Grant McGregor team is taking the opportunity to ask: what are the security threats we need to be aware of now? Here’s our take on the security issues you should be thinking about in 2020. Facing off against the ever-changing IT security threat resembles a game of...

Read More

Are You Doing Enough on Mobile Device Security?

Are You Doing Enough on Mobile Device Security?

We all want to do our best to keep our corporate data and systems safe. Each year, organisations invest millions in firewalls, anti-virus software, training and patching programmes. But how much of this is directed at mobile devices?

Read More

Passwords: Can we live without them?

Passwords: Can we live without them?

For thousands of years, passwords have been used as a means of authentication; a way in which people could be confident that security was maintained.

Read More

What NOT to do when you lose your mobile device

What NOT to do when you lose your mobile device

We rely so much on our smartphones these days, losing our phone or device (or having it stolen) would seem like a real crisis wouldn't it? So let's walk through what NOT to do, as well as what you should do if you find yourself in this situation.

Read More

Is it Time for an IT Spring Clean?

Is it Time for an IT Spring Clean?

The life of an IT manager can often feel like a thankless task. Staying on top of daily and weekly tasks can be difficult when problems and projects shift your focus away from basic housekeeping.

Read More

5 Things Every BYOD Policy Needs

5 Things Every BYOD Policy Needs

Bring Your Own Device (BYOD) policies are rapidly gaining traction in the modern workplace owing to the flexibility and convenience they provide to both employees and their employers.

Read More

Supporting Work Life Balance Through Technology

Supporting Work Life Balance Through Technology

Organisations in the UK have a legal obligation to consider employee requests to work flexibly.

Read More

    Categories

    see all