Clients      Employees

June 25, 2014

No Comments

7 Steps to Help You Get the Most from BYOD

 

ICG-BYOD

Users are bringing their personal mobile devices to the workplace – and that might seem like a blessing to a small to midsize business (SMB). And it can be. A Bring Your Own Device (BYOD) strategy can increase productivity and flexibility while enabling workers to use the devices they’re most familiar with. Plus, the company doesn’t have to purchase the technology.

 

But BYOD can also be fraught with pitfalls for the unwary. Most companies have designed their IT infrastructure to support desktops. Many policies and procedures have been thoroughly planned and implemented – but few of these older policies account for the requirements of employees’ personally owned mobile devices.

 

Security is a primary concern with any BYOD initiative. When employees are accessing and storing data on their mobile devices, your company’s sensitive information is at risk. Mobile devices can easily be lost or stolen, and an unsecure device can introduce malware that compromises your entire network.

June 16, 2014

No Comments

When Custom App Development Makes Sense

 

ICG-Custom-App-Development-Makes-Sense

In a previous post, we discussed the business case for custom application development versus cloud-based Software-as-a-Service (SaaS) solutions. Custom applications can be designed to precisely meet your business needs and conform precisely to your business processes and workflows.

 

That’s not to say that custom apps are always the way to go. It can be a waste of time and money to reinvent the wheel by developing custom software when there are functional, reliable and cost-effective solutions already available on the market.

 

For example, it rarely makes sense to develop office productivity tools such as Word and Excel, backup software, security tools or graphics applications. There are many applications in these categories that are technically mature and tuned to the needs of a large audience of users.

June 11, 2014

No Comments

Dropbox Users: Beware New Phishing Attack

 

ICG-Dropbox-Phishing

Users of the popular Dropbox file-sharing service should beware a new phishing attack with potentially costly consequences. Cyber criminals have been distributing emails that use links to Dropbox files to deliver malware.

 

The emails dupe users into thinking that they are receiving a fax or other legitimate document. If the user clicks the link, they are directed to Dropbox to download a .zip file that contains malware disguised as a screen saver. The malware proceeds to encrypt files on the user’s computer, then launches a page demanding that $500 in Bitcoins be deposited to the criminals’ electronic wallet. If the user fails to do so after a certain amount of time, the ransom doubles to $1,000.

 

Security firm PhishMe estimates that, as of June 6, victims had had up to 20,000 files encrypted, and the criminals had collected at least $62,000. The firm discovered the scam after about 20 of its 50 employees received the phishing messages. The attack does not exploit any sort of weakness in Dropbox.