security Archives - Cannon Group
December 7, 2016

What to Consider Before a Network Upgrade

Upgrading your enterprise network infrastructure is the best way to keep up with an ever-changing technology landscape. Based on time-tested Cannon Group processes, here are a few best practices for planning a network upgrade...
April 28, 2016

Are You Losing Money to Traffic Pumping?

Though security breaches seem to be most people’s greatest fear, traffic pumping is an underestimated and largely unknown culprit that could slowly but consistently be harming you financially.
March 16, 2016

How to Avoid Common and Costly BYOD Mistakes

To ensure maximized productivity and minimized risk with your BYOD program, it's essential to consider these factors: enterprise security, actual costs, the user experience, and a work-life balance.
September 25, 2015

BlackBerry to Release New Android Smartphone for Enterprise Security

When it comes to mobile security, studies show that mobile malware is a rapidly growing concern in today’s increasingly connected world. Enter a new breed of smartphone that’s designed to address these concerns and thus become the new face of enterprise security. At least, that’s what BlackBerry and Android – the duo behind this new device – are trying to accomplish.
May 20, 2015

Collaboration between CFOs and CIOs is Becoming Essential

CFOs and CIOs must work together to balance technology, investment strategy and risk. As CFOs become increasingly involved in IT, CIOs must help them make technology investment decisions using their knowledge of important IT issues.
May 12, 2015

More Hackers are Targeting Healthcare Providers

As cyberattacks become more rampant and hackers become savvier, the healthcare industry is finding itself in a dire situation. According to a recent study, cyberattacks against the U.S. healthcare system have more than doubled in the past five years—and it won’t stop there.
April 21, 2015

Fortify Your Security in 6 Steps

This week, the second largest U.S. health insurer became the victim of a massive cyberattack. In a world of instant sharing and storing information in the cloud, getting complacent with security is more dangerous than ever. Here are a few key pieces of advice to ensure that your information is secure as possible.
April 14, 2015

Here’s How Network Teams are Handling Enterprise Security

Security has been a hot topic in the business world lately. From cyberattacks to faulty enterprise security, there are many ways in which organizations can find themselves at risk. Experts say that network teams must take a more comprehensive approach to combat growing dangers.
February 6, 2015

Fortify Your Security in 6 Steps

This week, the second largest U.S. health insurer became the victim of a massive cyberattack. In a world of instant sharing and storing information in the cloud, getting complacent with security is more dangerous than ever. Here are a few key pieces of advice to ensure that your information is secure as possible.
January 23, 2015

The Worst Passwords of 2014

These are the most common, simplest and thus weakest passwords of 2014. They’re everything a password shouldn’t be: minimal, straightforward and painfully easy to guess... If you recognize any passwords on this list, it’s time for a password revolution.
January 13, 2015

Making the Case for Enhanced Mobile Security

Mobile malware is a growing concern worldwide – and particularly in the enterprise mobile world. This infographic shows why you should pay attention to mobile security, and how you can fortify your organization’s overall mobile protection in 2015.
January 8, 2015

7 Mobile Security Mistakes to Stop Making in 2015

One resolution to live by in the new year: With great technology comes great responsibility. The truth is that you could unknowingly be exposing sensitive information with a multitude of poor security habits. Read on and make sure to avoid these common mistakes in 2015.
December 31, 2014

What to Expect for Enterprise Infrastructure in 2015

The enterprise industry has seen immense change within the past several years, and as the new year looms ahead, experts say that 2015 will be no exception. Based on recent trends, expect increases in everything from cyberattacks to mobile investments in 2015...
December 16, 2014

Don’t Overlook Enterprise Security

While enterprise IT has made leaps and bounds in terms of technology and growth, the truth is that company IT environments could be more vulnerable than ever, thanks to a weak link in enterprise security.
October 23, 2014

Be Responsible About Cloud Implementation

When it comes to cloud implementation, don’t rely on automation to properly implement cloud for your business. It might be tempting to adopt a hands-off approach, but experts advise using the same due diligence you’d apply to traditional outsourcing engagements.
August 27, 2014

New Cyberattack Targets 1,000 Major Networks – and Probably More

As mobility management becomes an important standard in the workplace, IT managers are becoming more willing to outsource mobility management to a third-party managed mobility services (MMS) provider. Here's why that could be a smart decision...
August 19, 2014

The State of Enterprise App Development

As mobility gains traction in the enterprise, mobile business applications are becoming more profitable for developers. However, recent research finds that only 16 percent of app developers participate in building enterprise mobile apps.
August 14, 2014

Security Advice from Cyber-Experts

Top “cyber-experts” talk about avoiding security threats in the digital world. While they point out that there’s no such thing as a catch-all solution, there are many ways to defend against cyberattacks.
July 10, 2014

5 Benefits of Outsourcing Mobility Management

As mobility management becomes an important standard in the workplace, IT managers are becoming more willing to outsource mobility management to a third-party managed mobility services (MMS) provider. Here's why that could be a smart decision...
June 23, 2014

Specify Ownership and Support in BYOD Contracts

With more businesses implementing BYOD in the workplace, well-written contracts will become more important than ever. That’s why contract managers should heed this advice to avoid legal, structural and policy issues within BYOD programs.
June 17, 2014

Recent Cyberattack Calls Device Unlocking Policies into Question

At least 500 AT&T customers have become victims of a security breach, exposing sensitive personal information like Social Security numbers and birth dates. But the hackers' intent was reportedly benign: To unlock old, used devices.
May 15, 2014

New Kill Switches Will Ensure Smartphone Security

Last month, The Wireless Association (CTIA) began requiring major device manufacturers and network operators to offer the kill option on smartphones manufactured after July 2015.
April 28, 2014

Your Android Device May Be Vulnerable to Hackers

In the aftermath of Heartbleed, internet security is coming under close scrutiny. But it turns out that being hacked is still a very real threat for certain Android devices, calling enterprise mobile security into question.
April 21, 2014

Make BYOD Security a Priority, ASAP

As BYOD becomes an increasingly widespread trend in the workplace, a recent survey reveals that employees using personal devices in the workplace could be leaving themselves (and their companies) open to attack.
February 10, 2014

How to Ensure Mobile Security

While fast speeds and easy access to mobile Internet make LTE the next generation mobile technology, LTE devices are also more susceptible to security threats than their 3G counterparts. Defend your mobile device against increasing malware threats...
January 22, 2014

The Five Most Important Cloud Investments for Business in 2014

According to a study by Aberdeen Group surveying cloud usage in various businesses, business cloud users will increase their annual cloud spend by 8.6 percent, much greater than the predicted 1 percent increase in overall IT spending.*
December 12, 2013

Best Practices for Choosing the Right EMM Solution

One of the most effective ways to stay ahead of the rapidly growing mobile world is to adopt an enterprise mobility management (EMM) solution. According to a recent multi-market BYOD study, telecom business leaders are facing a critical decision: adapt to changing BYOD behavior, or be left in the dust.
December 6, 2013

Keeping Your Smartphone (And Personal Information) Safe

With an ever-increasing proliferation of smartphones in the market, a problem also emerges: the issue of smartphone theft. It’s a huge-scale problem with hundreds of devices stolen every day across the country, particularly in major cities. Now, the wireless industry is beginning to fight back.
November 21, 2013

M2M: More Convenience Could Mean Less Privacy

The world of M2M is beginning to offer some neat (and convenient) innovations, but this convenience may come at a price. Without added security measures to keep this technology in check, our privacy (and possibly our safety) is very much at stake.
October 29, 2013

The 10 Biggest Issues with WiFi

Although the WiFi market continues to quickly grow and evolve, there are still significant obstacles on the path to achieving seamless and improved WiFi usage. Below are a list of the toughest problems carriers face when it comes to a seamless WiFi experience.
October 15, 2013

A Business Mobility Infographic

Ever since mobile devices entered the business world, mobility has become valuable in the workplace. And according to research conducted by Cisco Systems, it’s up to enterprise CIOs and IT executives to facilitate the next phase of business mobility.