Enterprise mobility 2022: UEM adds user experience, AI, automation

Credit to Author: Bob Violino| Date: Tue, 03 May 2022 03:00:00 -0700

The past two years have seen mobility management take on a greater importance than ever in the enterprise. As remote and hybrid work models take hold at many organizations, “mobility management” has expanded its meaning from management of mobile devices to management of all devices used by mobile employees, wherever they happen to be working from.

Unified endpoint management (UEM) has become a strategic technology at the center of companies’ efforts to control this increasingly complex environment. Essentially combining enterprise mobility management (EMM) tools with PC management tools, UEM platforms help companies manage and protect a range of devices including smartphones, tablets, laptops, and desktop computers across multiple operating systems — all from a unified interface.

To read this article in full, please click here

Read more

Top 6 e-signature software tools

Credit to Author: Keith Shaw| Date: Wed, 20 Apr 2022 03:00:00 -0700

The COVID-19 pandemic did not just disrupt physical meetings and physical office spaces; workflows that relied on in-person interaction, such as signing documents and contracts, were also highly impacted. Electronic signature (e-signature) software has surged in popularity over the past two years as enterprises looked to modify their signature workflows to support a remote workforce, said Holly Muscolino, group vice president for content strategies and future of work at IDC.

With many companies returning to an in-person office environment or adopting a hybrid workforce approach, where employees work some days in the office and some at home, e-signature vendors are working to convince businesses that they are still relevant. Although the market has slowed down, Muscolino said, “it’s still showing healthy growth, because there are still companies who have not adopted this technology. There is still significant room for adoption.”

To read this article in full, please click here

Read more

iCloud goes down: Live by the service, die by the service

Credit to Author: Jonny Evans| Date: Tue, 22 Mar 2022 08:04:00 -0700

Read more

Blockchain integration turns ERP into a collaboration platform

Credit to Author: Lucas Mearian| Date: Fri, 09 Jun 2017 03:06:00 -0700

As the blockchain continues to mature and find adoption in areas other than cryptocurrency, ERP vendors are working to integrate the distributed ledger technology as a trackable, immutable record for everything from shipping manifests and supply chains to equipment maintenance and dispute-resolution systems.

“This is very real and something we’re aggressively excited about,” said Brigid McDermott, vice president of Blockchain Business Development at IBM. “What blockchain does is provide a trust system of record between disparate companies.”

To read this article in full or to leave a comment, please click here

Read more

Sneaky Gmail phishing attack fools with fake Google Docs app

Credit to Author: Michael Kan| Date: Thu, 04 May 2017 03:51:00 -0700

Google Docs was pulled into a sneaky email phishing attack on Tuesday that was designed to trick users into giving up access to their Gmail accounts.

The phishing emails, which circulated for about three hours before Google stopped them, invited the recipient to open what appeared to be a Google Doc. The teaser was a blue box that said, “Open in Docs.”

In reality, the link led to a dummy app that asked users for permission to access their Gmail account.

screen shot 2017 05 03 at 2.38.57 pm Reddit

An example of the phishing email that circulated on Tuesday.

To read this article in full or to leave a comment, please click here

Read more

Customers roast Microsoft over security bulletins' demise

Credit to Author: Gregg Keizer| Date: Mon, 24 Apr 2017 11:49:00 -0700

When Microsoft asked customers last week for feedback on the portal that just replaced the decades-long practice of delivering detailed security bulletins, it got an earful from unhappy users.

“Hate hate hate the new security bulletin format. HATE,” emphasized Janelle 322 in a support forum where Microsoft urged customers to post thoughts on the change. “I now have to manually transcribe this information to my spreadsheet to disseminate to my customers. You have just added 8 hours to my workload. Thanks for nothing.”

To read this article in full or to leave a comment, please click here

Read more

Email-based attacks exploit unpatched vulnerability in Microsoft Word

Credit to Author: Lucian Constantin| Date: Mon, 10 Apr 2017 08:08:00 -0700

Attackers have been exploiting an unpatched vulnerability in Microsoft Word for the past few months to compromise computers and infect them with malware.

The first report about the attacks came Friday from antivirus vendor McAfee after the company’s researchers analyzed some suspicious Word files spotted a day earlier. It turned out that the files were exploiting a vulnerability that affects “all Microsoft Office versions, including the latest Office 2016 running on Windows 10.”

The flaw is related to the Windows Object Linking and Embedding (OLE) feature in Microsoft Office that allows documents to embed references and links to other documents or objects, the McAfee researchers said in a blog post.

To read this article in full or to leave a comment, please click here

Read more

(Insider Story)

Read more