Tag Archives: byod

6 BYOD Security Best Practices

6 BYOD Security Best Practices

6 BYOD Security Best Practices Bring Your Own Device, commonly known as BYOD, and cloud computing are changing the way we use technology in the workplace. Sixty percent of businesses currently use a BYOD model, and forecasters suggest that number will rise to 90 percent by 2014. Fifty-four percent of American companies also use public…

Collaborative Economy – Customer Appreciation Day

Collaborative Economy – Customer Appreciation Day

Part 2 – Collaborative Economy – Customer Appreciation Day This is part 2 of a 2-part post on disruptive technologies and the collaborative economy. Click To Read Part 1 Customer Appreciation Day Customer Appreciation Day. Signs bearing this message have appeared regularly in store windows and print ads throughout the decades past – a well-intentioned…

3 Recommended Whitepapers: “Keeping Secrets – Good Password Practice”

3 Recommended Whitepapers: “Keeping Secrets – Good Password Practice”

3 Recommended Whitepapers: “Keeping Secrets – Good Password Practice” Cloud security and password protection is big business. Today we have provided 3 recommended research papers to read over this week which goes alongside today’s infographic. “Enterprise Password Management – A Guide for Best Practices” Learn how using RoboForm Enterprise is an easy, secure, and practical…

Let’s Talk Workspace Cloud Security!

Let’s Talk Workspace Cloud Security!

Let’s Talk Workspace Cloud Security! Let’s face it, security most likely tops the list for IT challenges and now with cloud technology’s significant expansion over the years and the increase of personal devices, also known as BYOD, being used in and outside the workplace, the challenges have gotten that much more intense. As per BT.com’s…

Making Bring Your Own Device (BYOD) And eDiscovery Work For Your Business

Making Bring Your Own Device (BYOD) And eDiscovery Work For Your Business

Making Bring Your Own Device (BYOD) The latest challenges to your business’ eDiscovery policies and procedures may not be changes in the law but may instead be changes in your employees’ lifestyles: they have smartphones and they want to use smartphones to facilitate their work. A 2011 study by IDC and Unisys showed that approximately…

Invisible Computing: How Cloud Is Forcing Software And Hardware Apart

Invisible Computing: How Cloud Is Forcing Software And Hardware Apart

Invisible Computing: How Cloud Is Forcing Software And Hardware Apart By 2018, Gartner predicts that 70 per cent of professionals will conduct their work on personal mobile devices, enabled by the revolutionary concept of cloud computing. Cloud computing essentially separates software from the logical functionality of local hardware. In other words, instead of needing computing…


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising