article thumbnail

Mobile device security policy

Tech Republic Security

PURPOSE This Mobile Device Security Policy from TechRepublic Premium provides guidelines for mobile device security needs in order to protect businesses and their employees. From the policy: REQUIREMENT FOR USERS If using a company-owned device, ensure that all mobile device use.

Policies 410
article thumbnail

IT frustration costs companies more than $100 million a year — with shadow IT the only user solution

CIO Business Intelligence

He recommends organizations put governance in place to provide guidelines for approved software use. When looking at mobile apps, enterprise mobility and IoT solutions provider SOTI has found similar problems as the WalkMe study. Some organizations are too strict, however, Gfesser adds.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Siemens Mobility scales RPA by empowering employees

CIO Business Intelligence

Siemens Mobility has been on a robotic process automation (RPA) journey for years, growing from five automated processes in 2017 to more than 700 now, transforming the company in the process. There was just one book [on RPA] on the market back in 2017, where today you have hundreds,” says Benjamin Bock, head of RPA at Siemens Mobility. “By

Mobile 299
article thumbnail

Are enterprises ready to adopt AI at scale?

CIO Business Intelligence

This challenge is particularly front and center in financial services with the arrival of new regulations and policies like the Digital Operational Resilience Act (DORA), which puts strict ICT risk management and security guidelines in place for firms in the European Union.

article thumbnail

Equipment Reassignment Checklist

Tech Republic Security

The reassignment of existing equipment takes place when employees leave the organization or receive new computers, mobile devices, printers and other assets. It is essential to follow strict guidelines for equipment reassignment so that company investments, data and privacy are protected.

article thumbnail

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform

CTOvision

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform. Today at Mobile World Congress, Fixmo announces the expansion of its collaboration with Samsung, the world’s largest smartphone manufacturer. About Fixmo.

Mobile 242
article thumbnail

Equipment reassignment checklist

Tech Republic Security

The reassignment of existing equipment takes place when employees leave the organization or receive new computers, mobile devices, printers and other assets. It is essential to follow strict guidelines for equipment reassignment so that company investments, data and privacy are protected.