How do we use mobile devices?

How do we use mobile devices?

Mobile users are using their devices to replace radio, with mobile audio – particularly music – now contributing 12% of mobile data traffic in North America, and growing by 4% elsewhere. Meanwhile, mobile search per subscriber has increased 25% since February 2012,...

Migrate to ‘everything over IP’

Converged communications open up a host of opportunities for businesses, and IP is often seen as the ultimate solution to bringing various communication media together. From voice and data to video, security and surveillance, even wireless printing and more, the...

Google applies to secret court

Google has reportedly asked the secret Foreign Intelligence Surveillance Court for permission to publish data pertaining to requests made by National Security Agency (NSA). According to a report in the New York Times, Google last week wrote to the director of the FBI...

Employee negligence risks company data

Employee negligence poses a serious threat to the security of corporate confidential data, according to more than half the respondents in the recent Worldwide Security Products survey by IDC. The companies identified this as a priority for 2013, and intend to work...

Legitimate sites can risk company data

Employees could be putting their company’s network and data at risk by visiting legitimate Web sites that have been secretly compromised with malware. This is according to Richard Broeke, sales manager at Securicom, a specialist provider of IT security services in...