Cloud backup: Our ultimate checklist to get you the perfect provider

As the cloud continues to become a commercial imperative for businesses, they have realised they must overhaul their data backup processes.

The data within your business is its most precious commodity. As such it is vital that the backup systems in place are robust enough to cope with not only your data backup needs today, but for the future.

When choosing a cloud backup provider, aside from the price, the user should pay attention to presence of the following functionalities:


  • Provide not only Cloud but Hybrid Backup as well of the user has sensitive data or data he/she cares about a lot, he/she must be sure that the cloud backup provider also has a functionality to backup up the data locally and on various media.
  • Protection for All devices most households and businesses deal with a myriad of devices - a computer, laptop, iPhone, etc - and a combination of different platforms - a Mac and a PC, an iPhone and an Android. The backup solution should protect all these devices and the various brands.
  • Web Access from Any Device the user should ensure of always having access to the files backed up to the cloud from any device.
  • Full-Image Backup and Recovery this means that the operating system, applications, history, preferences, photos, files, videos, bookmarks, all settings and customizations including license keys and passwords — everything, should be backed up to the cloud and locally. If everything is backed up, it can later be recovered to bare metal and a fully bootable state.  
  • File and Folder Backup and Recovery the user needs to be able to backup and recover a single file or folder. Then, the user should also be able to search cloud backups to quickly find and recover exactly what is needed.
  • Incremental Social Backup accidental deletion and social network errors can erase your memories and photos from Facebook forever, that’s why it would be nice if the cloud backup can backup Facebook, Instagram and more.
  • Multiple Backup Plans the user needs to be able to schedule as many different backup plans as needed.
  • Encryptions and Passwords it is important to be able to encrypt data on the computer before sending it to the secure cloud. This ensures maximum privacy and keeps the data safe.

What about businesses?

When selecting a cloud provider, it is important that you compare them against your key criteria: availability, pricing, performance, security etc. What is your organisation seeking to achieve with cloud, in terms of use cases or cost efficiencies? Select a provider or providers that enable you to extract the greatest business value today and down the road as your business requirements evolve.

  • Investigate multi-cloud strategies. Apart from cost or operational efficiencies, there’s a business continuity aspect to examine. When organisations run applications on multiple cloud services rather than relying on a single vendor, they reduce the risk of a vendor’s service outage causing them significant issues and downtime. 
  • Ensure your provider allows you to generate and manage encryption keys exclusively. A good cloud provider should offer various storage tiers to deliver cost efficiencies for various data types and offer the ability to automate the process.
  • Ensure your provider enables to create a Virtual Private Cloud (VPC) that is completely private to the customer.
  • Check the cost structure. Chose a provider that offers a flexible and cost-effective solution. A good cloud provider should offer various storage tier so that data is automatically moved data to the most cost-effective access tier based on access patterns, without impacting performance or operational overhead. 
  • Evaluate private/on-premises options that provide the same levels of scale and cost efficiencies while maintaining all data locally.

Safety steps

There are a number of easy-to-follow steps to ensure your data is safe when it moves to the cloud:


  • Look at your existing service level agreements. Often SLAs were written and signed in the pre-cloud period. Levels of accessibility, data backup responsibilities and ownership all need to the reconsidered for a cloud-based environment.
  • Does your existing service scale? One thing is certain: your current cloud storage capacity will be out stripped by your actual needs. As big data becomes more important for businesses, ensure your data backup service can scale as your needs expand.
  • Security is of paramount importance. SLAs must cover in detail the security that your cloud backups will use. This should include the security of the data centre itself, but also the security of your data as it moves from your business, over the internet and onto your backup service provider's servers.
  • When disaster strikes, a good data backup service is only as good as its recovery options. If your business did lose on-site data, how would your business recover these files? Look for a backup service that has redundancy built into its data centres and also offers other means of shipping your lost files to your premises.
  • Think about physical security. As your business is backing up its data off-site, how safe and secure is your cloud partner's data centre? Many data centres are in disused nuclear bunkers, but many are not, so look closely at the physical security of their data centre premises.
  • Ronan McCurtin, senior sales director at Acronis for Northern Europe and Sabo Diab, VP Global Marketing at CTERA networks have contributed to this feature.
Posted in Uncategorised

Business on the move: how to secure 4G and public Wi-Fi connections

Working on the move is now commonplace, and being able to connect to the internet anywhere and at any time has become an essential business service.

The plethora of Wi-Fi hotspots offer fast and cheap access. However, for business users, security must at all times be of paramount importance, which is why many mobile business users have moved away from using Wi-Fi to 4G access services.

Cyber security company F-Secure says: "Public Wi-Fi simply wasn't built with 21st century security demands in mind. When you use public Wi-Fi without any added security measures, you leak data about yourself from your device."

So if public Wi-Fi is simply too insecure for business users, what's the solution?

As mobile phone networks have improved, speeds have moved past what can be expected with an average Wi-Fi connection, making 4G the connection channel of choice for fast and secure internet access on the move.

Advances in mobile connectivity offer solid speeds depending on the carrier and the location, often better than can be expected with the average Wi-Fi connection, especially if you're trying to use a congested Wi-Fi hotspot.

The speed and convenience that 4G connections have delivered to business users in particular has meant their popularity has rocketed – so using 4G securely is now a priority. There are a number of simple steps you can take to ensure your 4G connection is always safe and secure.

1. Install mobile security applications

When using mobile devices with 4G always ensure you have adequate protection installed. McAfee Mobile Security is a good example and is available for Android and iOS devices.

2. Take care with automatic updates

If you are in the habit of simply downloading each new update you are offered for your 4G devices, start to assess where these updates are actually coming from. Ensure each update is legitimate and from your 4G service provider, and isn't malware disguised as an update. Automatic updates can be disabled on Android, so they can be individually approved.

3. Use a mobile VPN (Virtual Private Network)

If you want to ensure that sensitive data is protected as it moves to and from your mobile devices, setting up a VPN is an ideal solution. Both Android and iOS support the use of VPNs. Windows and Mac OS X also have a range of VPNs to choose from.

4. Use strong passwords

The password may be the bane of many users' lives, but they're still the main way that Wi-Fi login is enabled. Develop a strong password regime, and don't use the same password for all your logins. There are lots of password managers to choose from – we've rounded up the best of them in this article.

5. Forget the Wi-Fi network

Try and get into the habit of connecting to a public Wi-Fi hotspot for the shortest possible time, and when you've finished ensure your device forgets the network – this prevents your device becoming vulnerable when you're not using it yourself.

It's a commercial imperative to ensure that all the devices you use over a 4G network are protected by the latest anti-malware applications, and that every live connection you make to the internet is done over a secure channel encrypted to combat any eavesdropping. When working on the move, security should be your top priority.

If you have no option but to use a public Wi-Fi hotspot, follow these steps to ensure that your connection is secure:

1. Connect using a reputable Wi-Fi provider

Think about where the Wi-Fi hotspots you use are located. Are these connections legitimate? Check the credentials of the service provider before you connect and transmit or receive sensitive information.

2. Use a VPN

As we've already mentioned, one of the easiest ways to ensure your data is safe and secure is to always use a VPN. Today these are efficient and straightforward to use. Some good examples are Avast SecureLine, proXPN and Hotspot Shield.

3. Only connect with secure websites

When you're working try and resist the temptation to check your Facebook profile or do some online banking – these are the kinds of websites cybercriminals target to gain personal information they can exploit. If you need to connect to these sites, use a service such as HTTPS Everywhere to encrypt your connection.

4. Install antivirus and anti-malware applications

Anatomy of a Hacked Mobile Device

'Anatomy of a Hacked Mobile Device' drawn from the Sophos Security Threat Report 2014

The connection you choose is only half of the security issue you face. Often, malware will infiltrate your notebook or phone and begin to crack your passwords.

SophosLabs, which has studied the issue of malware on mobile devices for a decade, warns that mobile malware is on the rise. Its startling observation is that Android malware increased for every month of 2017, with a startling 30% of this malware in the category of particularly malignant ransomware.

Keep your security applications – such as one of our recommended applications – up to date at all times.

5. Turn off all sharing options

At home you probably share your computer with a printer or maybe even an external hard drive. When you're using a Wi-Fi hotspot turn off the sharing options, as these can give cybercriminals an open door to penetrate your computer.

6. Monitor the apps you use

Cybercriminals can use installed apps as a doorway into your phone or tablet. If one of your apps begins to behave strangely delete it immediately, as it may have been hacked.

7. Never jailbreak your phone

Jailbreaking a device will instantly disable the built-in security. Only use apps that have come from a legitimate source on a phone or tablet that has not been modified in any way.

8. Turn off Bluetooth

Switching off Bluetooth when you're not using it is a sensible option as it closes another channel that could be used to hack your device – it also saves battery life.

9. Encrypt your sensitive data

All the data that moves over a VPN will be encrypted, but if you don't have a VPN available then encrypting your emails is a sensible precaution to take if they contain attachments with sensitive information.

Posted in Uncategorised

Bring your own security: protecting business data on every device

Does your business allow its employees to use their own phones and tablets at work? The so-called BYOD (Bring Your Own Device) and now WYOD (Wear Your Own Device) trend has continued to expand, as employees use their personal devices for work and play. In 2018, 50% of North American businesses have BYOD policies, and 69% of IT decision-makers are pro BYOD.

What this has meant for business owners is a revisiting of their security policies, and the protocols in use to ensure these devices, and the information they contain, are always secure. This is vital, as Kaspersky Labs has already identified one million pieces of mobile malware that can compromise smartphones.

Gartner comments: "BYOD does increase risks and changes expectations for CIOs (Chief Information Officers). Unsurprisingly, security is the top concern for BYOD. The risk of data leakage on mobile platforms is particularly acute.

"Some mobile devices are designed to share data in the cloud and have no general purpose file system for applications to share, increasing the potential for data to be easily duplicated between applications and moved between applications and the cloud."

There are a number of issues to be considered when managing the security of BYOD across your organization, including:

1. Having no policy regarding the downloading and installation of apps

There are now millions of apps to choose from. Having no policy regarding which apps can and can't be installed opens any device to potential attacks from malware, such as a banking Trojan that hid as a Super Mario app. Create a blacklist of apps that employees should never install on their phones.

2. Privacy versus monitoring

The ability of every mobile device to be tracked can raise privacy issues where BYOD is concerned. Few employees will wish their location to be tracked and monitored when not at work. However, businesses need to know where each device is, with geofencing setting parameters that state a device will only be monitored during office hours.

3. Monitor business usage

As a device could be used for personal and business calls and data exchange, it's important to track usage to ensure costs to the business are allocated correctly. This includes when the devices are used overseas to avoid excessive roaming charges.

4. Choice of device

The whole philosophy behind BYOD is that workers can choose their own device to use. However, security policy must dictate that this can't include jail-broken phones, for instance, or any other device that has not been authorized. Your security policy should include a list of devices that are approved, a variant on the BYOD policy known as CYOD – Choose Your Own Device.

5. Information is security

A security policy that isn't clearly communicated is of little use, so train your staff to ensure they're aware of their responsibilities under your BYOD security policy. And this isn't a set up and forget exercise; monitor how BYOD develops across your business, and modify your security policy accordingly.

These are the biggest security concerns when it comes to BYOD

These are the biggest security concerns when it comes to BYOD (Source: Information Security Community on LinkedIn)

In its BYOD security report [PDF], EY advises: "The risk of the device itself should be assessed as a part of the company's risk assessment framework. In some organizations a tiered device architecture may be viable to deal with varying degrees of risks tied to job functions.

"For instance, devices that are being used to present sensitive financial data to the board through a custom app will invariably be more sensitive to theft or accidental loss than a mobile device with access to calendar and email updates."

Intelligent defence

With businesses entering a possible post-PC era, ensuring that every device used by your employees has adequate levels of security is vital. What's more, as workforces continue to become more mobile and geographically dispersed, the use of mobile devices will expand; they'll account for 73% of Internet consumption in 2018.

Security policies must take account of this expansion, yet enable workers to use the same device in their private lives, as well as at work.

IT managers and CIOs need to look at how their existing security policies can be amended to maintain high levels of data security with BYOD. A policy can be modified in several ways:

  • A virtual desktop infrastructure (VDI) can be used to allow BYOD devices to securely access business servers without any cross-pollination of data that could include malicious code.
  • Decisions should be made on the level of access that devices will have to a corporate network. Businesses want to allow BYOD, but limits should be set and communicated to users.
  • The storage of sensitive data on personal devices can be allowed, but within limits set after consultation across users to strike a balance between day-to-day needs for data access, and the overall business security policy that includes compliance with data-protection regulations.
  • Mobile device management (MDM) may at first glance seem to be the solution to security issues, but IT managers and CIOs should look closely at how MDM can be used to control a device environment that includes BYOD.
  • It's important to maintain endpoint security within a BYOD environment. Remote wiping of data, and on-board antivirus protection, become essential, as it's easy for an infection to spread from a user's home network.
  • Using a private cloud environment to protect BYOD users and provide a single management console for IT managers should also be considered.

Pulse Secure further notes: "Where organizations have attempted to embrace BYOD with MDM suites or capabilities, they are often met with resistance from users concerned that their personal devices are falling under the control of their enterprise admins.

"[We] should expect to see a shift from enterprises trying to manage and secure an entire mobile device via MDM to one of employing workspaces to secure only portions of the device that access and store corporate data.

"This shift will be an attempt to reduce tensions between enterprise admins and the personal device owners over who owns what data and what ability the enterprise has to secure data and lock and wipe devices at their discretion."

Risks and rewards

To gain an insight into the current state of BYOD security, TechRadar pro spoke with Garry Sidaway, SVP Security Strategy and Alliances at NTT Com Security, on a number of issues including the core security risks facing businesses and the advantages (or disadvantages) of wearables.

Garry Sidaway, SVP Security Strategy and Alliances at NTT Com Security

Garry Sidaway, SVP Security Strategy and Alliances at NTT Com Security

TechRadar pro: Are businesses paying enough attention to the security risks that BYOD/WYOD present to their organizations?

Garry Sidaway: Most companies have put in place controls and processes to manage BYOD, in particular mobile devices like phones and tablets, but wearables and connected devices aren't typically considered in an organization's risk management strategy.

As more and more devices are connected, the security implications are massive. As always, understanding the real risk and putting risk in context is essential.

TRP: What are the core security risks that BYOD/WYOD present to businesses?

GS: The risks associated with BYOD/WYOD are the potential ingress and egress of information. Monitoring the current logs with the existing connected devices and security technologies is already becoming a huge challenge to businesses but, when you start to include unusual devices such as watches and TVs, the volume of data and false alerts could potentially be overwhelming.

This is before you even consider the skills required to regularly monitor and analyze such data.

TRP: Can businesses take any practical steps to minimise the security exposure that wearable devices present to their companies?

GS: Putting the risk in context is essential, and also to put in place the necessary policies which should be an extension of plans already in place for BYOD. These should then be enforced with network and access control systems, extending protection to wearable devices which will typically be connected over Bluetooth or wireless.

Finally, look towards analysing logs effectively and efficiently which can be achieved through working with a Managed Security Services Provider (MSSP) who covers such devices.

TRP: Is there a fine balance to be struck with the advantages that wearable devices bring to businesses and their employees, and the organization's need to protect sensitive information?

GS: As always with advances in personal innovation and business, there is a fine balance. Where the initial reaction to BYOD was negative from the security department, we have seen that businesses can benefit once wearables have been analyzed and the risks understood.

TRP: What do you think wearable device security looks like?

GS: Wearable devices will typically connect through wireless connections and as such can be managed through traditional network access controls. The focus should also be placed on effectively managing the increase in log traffic.

Most of these devices will not be looked upon as a security risk but they can (and will) be exploited as any other connected device. TVs with microphones, personal monitoring and privacy, cars and fridges with no protection, are all potential entry points in an organization's infrastructure.

But ensuring that these risks are put in context and understood before simply banning them is essential, as businesses can enable innovation and personal efficiency.

Conclusion

There's little doubt that BYOD/WYOD will continue to impact on every business. As more sensitive information moves to consumer devices, your business needs a robust and flexible security policy to ensure data, networks and the transmission of this sensitive information is safe and secure.

Posted in Uncategorised

The best MDM solutions for November 2017

As the rise of BYOD (Bring Your Own Device) has become an unstoppable force across the business landscape, managing what can be a host of mobile devices is now a critical consideration for every enterprise.

With an expanding fleet of mobile devices, businesses need a platform that enables high levels of oversight and solid data protection. An MDM (Mobile Device Management) system is now vital.

Before you choose, take a look at our selections for the top ten leading MDM solutions, and the reasoning behind why we picked them.

VMware Air Watch

1. VMware AirWatch

AirWatch has continued to gain market share and reputation as one of the top MDM systems available. This is an enterprise-level EMM (Enterprise Mobile Management) solution that can handle large numbers of devices with varying operating systems.

Gartner's Magic Quadrant 2016 places AirWatch as a leader in this sector pointing to its ease of setup and intuitive management interface. Once each device has its appropriate app installed it can then join the secure cloud of control that AirWatch can manage. The structured low-start pricing scheme is also highly attractive enabling organisations to scale MDM support as they grow.

BES 12

2. BlackBerry UEM

BlackBerry simply refuses to die in the face of the iPhone and Android onslaught. Still massively popular in specific sectors such as government, BlackBerries continue to demand the loyalty that only Apple can match.

With Blackberry UEM it is nderstood that customers need to manage a mixed mobile device environment. Multi-platform support is now catered for, but of course the core features speak to BlackBerry stalwarts with rock-solid support continuing for its trusted network. UEM may not have the bells and whistles of AirWatch for instance, but for BlackBerry-dominated businesses it is a must-have upgrade.

MaaS360

3. IBM MaaS360

IBM stepped into the MDM market with the acquisition of Fiberlink Communications two years ago. Since then, IBM has been improving this product and with a low entry point for device deployment it has been gaining market share. Watch out, though, for the hike in price when some of the add-on features are enabled. Other MDM platforms have some of these as standard out of the box.

IBM's long history with enterprise security is clearly evident with MaaS360. If you are looking for a very low-cost offering on which to build your MDM platform, no one has ever got fired buying IBM.

MobileIron

4. MobileIron

A good MDM should not add another layer of complexity to a business. The fast and seamless addition of new devices should be at the core of its features – and MobileIron offers just this level of functionality.

The MobileIron Core is where application priorities can be set. MobileIron Sentry is where secure gateways can be implemented, including VPN connections. Security policies can be easily enforced, with any device that has been jailbroken rejected by the MDM system.

With multiple OS support and a growing ecosystem of third-party applications to extend the MDM's capabilities, MobileIron's Apps@Work, Docs@Work and Web@Work offer a dynamic system that any size of business can easily integrate into their operations.

Citrix XenMobile

5. Citrix XenMobile

XenMobile is another highlight in the Leaders Quadrant of the 2016 Gartner Magic Quadrant for Enterprise Mobility Management Suites. The platform has low starting costs along with deep integration, even if this does require using the company's own Citrix Worx apps. This does, however, mean that businesses can gain a high level of security across their mobile applications.

If native apps tied to a particular OS are not a priority, the Citrix ecosystem coupled with its strong security-focused MDM could be a fast and easy purchase for businesses looking to solve any BYOD headache they currently have. And with a detailed and comprehensive management console, organisations can buy the vast experience with mobile connectivity Citrix has been developing for decades.

SAP Afaria

6. SAP Afaria

This MDM is approaching 20 years old. Afaria has continued to evolve as mobile platforms and their operating systems have expanded. The ease with which a mixed OS environment can be managed has won it much praise. A fast deployment of updates to mobile apps, and a deep interrogation of devices that may be jailbroken, gives its users peace of mind where security is concerned.

Add on SAP Mobile App Protection by Mocana to manage high-level security for app development, and Afaria is more than simply an MDM solution, but a suite of services that can reach far beyond merely securing a BYOD workspace.

Mobile Device Manager Plus

7. Mobile Device Manager Plus

ManageEngine offers a range of tools within its MDM suite. Owned by Zoho, users of its office applications will appreciate the simplicity on offer here. This MDM doesn't have the bells and whistles of AirWatch for instance, but if you need to manage a small group of mobile devices, it's a great entry-level MDM to try. Also the very low price per device makes Manager Plus a highly competitive and attractive package for micro-businesses that need to take more control of their digital security.

Microsoft Intune

8. Microsoft Intune

Microsoft has embraced the unique capabilities of the cloud with its MDM – and Intune also offers comprehensive mobile application management. Windows, Windows Phone, iOS, and Android are all fully supported. Microsoft also doesn't forget its heritage with support for desktop and mobile PCs via its System Centre Configuration Manager – you can further enhance your ability to manage PCs, Macs, and UNIX/Linux servers, as well as mobile devices, all from a single management console.

Intune is also a component of Microsoft's Enterprise Mobility Suite (EMS) consisting of Intune itself and Microsoft Azure Active Directory Premium with Microsoft Azure Rights Management. If your business needs large-scale MDM with additional services, Intune is more than capable.

SOTI MobiControl

9. SOTI MobiControl

With a history that stretches back to 2004, the basis for this MDM was a Windows PC/CE management tool. Since then, the tool has evolved to its present form. Included in MobiControl are concepts that will be familiar to Windows IT specialists including group privileges and tight integration with the Windows ecosystem.

The features on offer are comprehensive. Express Enrolment allows devices to be preconfigured before deployment. Geo-awareness and geo-fencing capabilities are available, content being secured with SOTI Surf, Content Library and Hub.

SimplySecure

10. SimplySecure

Beachhead Solutions has developed its SimplySecure MDM offering to be easy to set up and manage. Businesses of all sizes can include a range of devices within their MDM environment and ensure high levels of policy control, security and visibility, particularly of mobile devices (which can include portable storage devices as well as phones and tablets).

Completely OS agnostic, SimplySecure boasts a full set of features including admin and password management, encryption and remote data wiping. It's not the cheapest way to buy an MDM, but the modular approach to features does ensure this service can grow as your business expands.

Posted in Uncategorised

Updated: 10 mobile device management solutions to choose from

Updated: 10 mobile device management solutions to choose from

Introduction and MDM solutions 1 to 5

Note: Our best MDM solutions round-up has been fully updated. This feature was first published in June 2014.

As the rise of BYOD (Bring Your Own Device) has become an unstoppable force across the business landscape, managing what can be a host of mobile devices is now critical to every enterprise.

With an expanding fleet of mobile devices, businesses need a platform that enables high levels of oversight and solid data protection. An MDM (Mobile Device Management) system is now vital.

Before you choose, take a look at our selections for the top ten leading MDM solutions, and the reasoning behind why we picked them.

VMware Air Watch

1. VMware AirWatch

AirWatch has continued to gain market share and reputation as one of the top MDM systems available. This is an enterprise-level EMM (Enterprise Mobile Management) solution that can handle large numbers of devices with varying operating systems.

Gartner's Magic Quadrant 2016 places AirWatch as a leader in this sector pointing to its ease of setup and intuitive management interface. Once each device has its appropriate app installed it can then join the secure cloud of control that AirWatch can manage. The structured low-start pricing scheme is also highly attractive enabling organisations to scale MDM support as they grow.

BES 12

2. BlackBerry Enterprise Service 12 (BES 12)

BlackBerry simply refuses to die in the face of the iPhone and Android onslaught. Still massively popular in specific sectors such as government, BlackBerries continue to demand the loyalty that only Apple can match.

With BES 12, Blackberry has understood that customers need to manage a mixed mobile device environment. Multi-platform support is now catered for, but of course the core features speak to BlackBerry stalwarts with rock-solid support continuing for its trusted network. BES may not have the bells and whistles of AirWatch for instance, but for BlackBerry-dominated businesses it is a must-have upgrade.

MaaS360

3. MaaS360

IBM stepped into the MDM market with the acquisition of Fiberlink Communications two years ago. Since then, IBM has been improving this product and with a low entry point for device deployment it has been gaining market share. Watch out, though, for the hike in price when some of the add-on features are enabled. Other MDM platforms have some of these as standard out of the box.

IBM's long history with enterprise security is clearly evident with MaaS360. If you are looking for a very low-cost offering on which to build your MDM platform, no one has ever got fired buying IBM.

MobileIron

4. MobileIron

A good MDM should not add another layer of complexity to a business. The fast and seamless addition of new devices should be at the core of its features – and MobileIron offers just this level of functionality.

The MobileIron Core is where application priorities can be set. MobileIron Sentry is where secure gateways can be implemented, including VPN connections. Security policies can be easily enforced, with any device that has been jailbroken rejected by the MDM system.

With multiple OS support and a growing ecosystem of third-party applications to extend the MDM's capabilities, MobileIron's Apps@Work, Docs@Work and Web@Work offer a dynamic system that any size of business can easily integrate into their operations.

Citrix XenMobile

5. Citrix XenMobile

XenMobile is another highlight in the Leaders Quadrant of the 2016 Gartner Magic Quadrant for Enterprise Mobility Management Suites. The platform has low starting costs along with deep integration, even if this does require using the company's own Citrix Worx apps. This does, however, mean that businesses can gain a high level of security across their mobile applications.

If native apps tied to a particular OS are not a priority, the Citrix ecosystem coupled with its strong security-focused MDM could be a fast and easy purchase for businesses looking to solve any BYOD headache they currently have. And with a detailed and comprehensive management console, organisations can buy the vast experience with mobile connectivity Citrix has been developing for decades.

MDM solutions 6 to 10

SAP Afaria

6. SAP Afaria

This MDM is approaching 20 years old. Afaria has continued to evolve as mobile platforms and their operating systems have expanded. The ease with which a mixed OS environment can be managed has won it much praise. A fast deployment of updates to mobile apps, and a deep interrogation of devices that may be jailbroken, gives its users peace of mind where security is concerned.

Add on SAP Mobile App Protection by Mocana to manage high-level security for app development, and Afaria is more than simply an MDM solution, but a suite of services that can reach far beyond merely securing a BYOD workspace.

Mobile Device Manager Plus

7. Mobile Device Manager Plus

ManageEngine offers a range of tools within its MDM suite. Owned by Zoho, users of its office applications will appreciate the simplicity on offer here. This MDM doesn't have the bells and whistles of AirWatch for instance, but if you need to manage a small group of mobile devices, it's a great entry-level MDM to try. Also the very low price per device makes Manager Plus a highly competitive and attractive package for micro-businesses that need to take more control of their digital security.

Microsoft Intune

8. Microsoft Intune

Microsoft has embraced the unique capabilities of the cloud with its MDM – and Intune also offers comprehensive mobile application management. Windows, Windows Phone, iOS, and Android are all fully supported. Microsoft also doesn't forget its heritage with support for desktop and mobile PCs via its System Centre Configuration Manager – you can further enhance your ability to manage PCs, Macs, and UNIX/Linux servers, as well as mobile devices, all from a single management console.

Intune is also a component of Microsoft's Enterprise Mobility Suite (EMS) consisting of Intune itself and Microsoft Azure Active Directory Premium with Microsoft Azure Rights Management. If your business needs large-scale MDM with additional services, Intune is more than capable.

SOTI MobiControl

9. SOTI MobiControl

With a history that stretches back to 2004, the basis for this MDM was a Windows PC/CE management tool. Since then, the tool has evolved to its present form. Included in MobiControl are concepts that will be familiar to Windows IT specialists including group privileges and tight integration with the Windows ecosystem.

The features on offer are comprehensive. Express Enrolment allows devices to be preconfigured before deployment. Geo-awareness and geo-fencing capabilities are available, content being secured with SOTI Surf, Content Library and Hub.

SimplySecure

10. SimplySecure

Beachhead Solutions has developed its SimplySecure MDM offering to be easy to set up and manage. Businesses of all sizes can include a range of devices within their MDM environment and ensure high levels of policy control, security and visibility, particularly of mobile devices (which can include portable storage devices as well as phones and tablets).

Completely OS agnostic, SimplySecure boasts a full set of features including admin and password management, encryption and remote data wiping. It's not the cheapest way to buy an MDM, but the modular approach to features does ensure this service can grow as your business expands.

Posted in Uncategorised

How to manage mobile devices across your business

How to manage mobile devices across your business

Introduction and MDM vendors

The huge uptake of smartphones and tablets, coupled with ready access to fast mobile connections to the internet, has delivered a perfect storm of opportunities, but also challenges to the small business community in particular.

Commenting in the last Solutions Review, Elizabeth O'Dowd said: "What makes an enterprise mobility solution even more important is the value it holds for the future of your enterprise. Computers are only becoming smaller; laptops are considered mobile devices to most of the top solutions, not just smartphones.

"Sooner than you realise, mobile devices in the enterprise will be a necessity as the lifestyle of the workplace begins to change. Ignore this and not only will you have less efficient workers than your competitors, but employees will seek to work other places with more favourable and modern work environments."

For your business, the age of the PC is well and truly over. The new era is more about collaboration, decentralisation and the further adoption of mobile devices as BYOD (Bring Your Own Device) accelerates.

"BYOD strategies are the most radical change to the economics and the culture of client computing in business in decades," said David Willis, vice president and distinguished analyst at Gartner. "The benefits of BYOD include creating new mobile workforce opportunities, increasing employee satisfaction, and reducing or avoiding costs."

Indeed, Gartner believes next year will see half of all employers expecting their workforces to bring their own mobile devices to work.

All businesses will need to develop their own Mobile Device Management (MDM) platform. In essence, these give your business the tools it needs to ensure mobile devices are used efficiently across your business in a completely secure environment.

Key advantages

Having an MDM operating in your business offers a number of key advantages:

  • All the devices being used across your business are known and tracked
  • Only authorised devices can connect to your company network
  • Anyone connecting to your network from a public Wi-Fi access point is either authorised to do so, or blocked
  • Devices have security systems installed that separate the business applications on the user's device from their personal information and apps
  • Lost or stolen devices can be remotely wiped of any sensitive data
  • Some services are cloud-based (AirWatch is a good example) and offer low-cost entry for smaller enterprises

Commenting, Trent Fierro, director of security and software solutions marketing at Aruba, a Hewlett Packard Enterprise company, said: "Our advice to any enterprise is to address BYOD and mobility in phases. Determine where data loss can cause the most damage, which groups are most susceptible and how vulnerable the business is.

"Don't expect BYOD to go away, so create a plan that defines user roles, roles for devices and what happens when rules are met and when they are not. Measure where user and IT benefits improve, as well as the organization's security posture and then move forward to solve the next use case."

When you are looking for an MDM vendor ask these questions:

1. Is the MDM platform neutral?

This is important to ensure all operating systems are supported. In an ideal world all of your staff would use the same mobile devices from identical vendors, but in the real world you need to ensure your MDM can offer multi-OS management support.

2. Does the MDM support various configurations?

Thanks to the advent of apps, every device that could be used across your business has a different profile. A good MDM should be able to take this into consideration and modify its protocols accordingly.

3. Is the MDM based on a legacy system?

MDMs that have been specifically built to meet their purpose are preferable to an MDM that is a modification of an existing technology. This will ensure your MDM vendor understands your pressure points, is paying attention to the mobile ecosystem, and is developing their platform to cope with new technologies as they appear.

For the small business community, consider these options:

The bottom line for all small business owners is that the use of mobile devices in their business is only going to expand. Developing an MDM service now ensures you can manage these devices securely today and into the future.

Todd Carothers, executive VP of Product and Marketing, CounterPath

Todd Carothers, executive VP of Product and Marketing, CounterPath told techradar pro: "Having worked with leaders in the MDM/EMM (Enterprise Mobility Management) market I find that there are two primary reasons businesses don't leverage these products.

"The first is cost versus benefit, with businesses often reluctant to invest in a product or service because it doesn't see the immediate, palpable benefits. The second is the lack of perceived need, although this is slowly changing as we see a rise in security breaches and increased awareness as a result."

Security matters and staying in control

Security matters

In its 'Enabling Secure BYOD' report Fortinet states: "BYOD is another battle in the war between security and usability. End users from the CEO down to line workers want the ability to use personal devices for work purposes, their belief being that personal devices are more powerful, flexible, and usable than those offered by corporate."

Business owners need to look at how their existing security policies can be amended to ensure the high levels of data security their organisations enjoy can be maintained when BYOD devices are used. Modifications to a security policy can include:

  • The use of VDI (Virtual Desktop Infrastructure) to allow BYOD devices to securely access business servers without any cross-pollination of data that could include malicious code
  • A decision as to the level of access that BYOD devices will have to a corporate network. Businesses want to allow BYOD, but limits should be set and communicated to BYOD users
  • The storage and transportation of sensitive data on personal devices can be allowed, but within certain limits set after consultation across users to ensure a balance can be struck between day-to-day needs for data access, and the overall business security policy that includes compliance with data protection regulations
  • Mobile Device Management may at first glance seem to be the solution to BYOD security issues, but IT managers and CIOs should look closely at how MDM can be used to control a device environment that includes BYOD
  • Endpoint security becomes even more important to maintain within a BYOD environment. Remote wiping of data, and on-board antivirus protection become essential, as infection can easily occur via a user's home network that their device will connect to
  • Using a private cloud environment to protect BYOD users and provide a single management console for IT managers should be considered

BYOD security is clearly an area that small businesses in particular have yet to fully get to grips with. Research by Decisive Analytics stated: "Most companies (83%) require employees to install software to secure and manage their personal devices when used for work purposes. We asked the companies that do not require security software why they did not require it.

"Surprisingly, the most common responses were: 'We only allow trusted users to connect to the network' (25.7%), and 'We are not concerned about security on these devices' (15.6%). Some say they have not had a security software solution (13.8%) or are still researching a security solution (12.8%). User rejection (11%), perceived high cost (10%), and perceived complexity (3.7%) were less frequently mentioned."

The rapid expansion of BYOD has run ahead of business security policies that tend to be rooted in traditional desktop deployments, with notebook VPNs providing robust security for employees that do work remotely.

BYOD needs to be controlled as it expands across organisations

Staying in control

For small businesses in particular the convergence of technologies that has culminated in the phenomenon we know as BYOD needs to be controlled as it expands across their organisations.

James Lyne, global head of security research at Sophos told techradar pro:

"For some time now I've predicted the coalescence of mobile and traditional computing platforms, as they grow to have more similar application models and use cases. We are at a very interesting point in security where there are a wide range of new devices being deployed – from mobile to Internet of Things.

He continued: "So far many of these devices have been found lacking by security researchers but few have been the focus of cybercriminals, I suspect as they hold less interesting data than the traditional computing device. It could be a very short time indeed until that changes, leading attackers to focus on technologies that have a significantly weaker security infrastructure.

"Ultimately, small businesses need to make sure they work with a security provider that can protect them at every point appropriately and can continue to do so as new devices enter their networks."

How much control your business has over the mobile devices it uses in and outside of the office environment is also a pressing question that needs to be answered

Nassar Hussain, Managing Director for Europe and South Africa at SOTI advises: "Locking everything down will only prove counter-productive. Employees need flexibility to use their mobile devices in ways that accelerate their productivity, but there are some basic security policies that need to be implemented to protect small business data and the networks those devices have access to.

"If the correct procedures and prevention mechanisms are put in place to address mobile security concerns, and you have employees exercising best practices and open communication between the user and the business' security expectations, you will see a lot of potential threats being avoided."

Managing the mobile technologies that now proliferate across your business needs planning to understand how these devices are being used. With this information you can develop a detailed policy that enables your business to use these technologies safely and reap the rewards that they clearly offer.

Posted in Uncategorised

What’s the best mobile card payment reader for your business?

What's the best mobile card payment reader for your business?

Introduction and payment choices

Business is now transacted on the move. According to the latest figures from the UK Cards Association, total spending on payment cards in November 2015 reached £53.2 billion (around $75 billion, or AU$103 billion), with rises partly attributable to the impact of Black Friday and Cyber Monday.

Richard Koch, head of policy at the UK Cards Association, said: "Making a contactless payment is fast, easy and secure. With so many retailers now accepting this technology, we are sure consumers will continue to vote with their wallets and use contactless cards as their preferred way to pay."

There is no doubt that the success of contactless payments is heralding a new era of mobile commerce. Consumers want to pay quickly and conveniently, which today means using their smartphones.

"While we're excited to see consumers saying they expect to triple their weekly spend using mobile payments over the next five years, we at Visa think those numbers could be rather conservative and that the actual adoption rate will be much higher," commented Jeremy Nicholds, executive director for Mobile, Visa Europe.

He added: "This is particularly true when you look at the growth in contactless usage, which saw European usage grow by two times and spend grow by three times over the last 12 months."

For SMBs, offering the right payment methods has always been a vital component of their businesses. With more consumers wanting to buy on the move, ensuring your business has the right mobile payment methods on offer is a commercial imperative that can't be ignored.

Payment choices

The smartphone and tablet have not only delivered a mobile digital wallet to consumers, but this technology can also be used by your business to enhance its payment systems. With the addition of some low-cost hardware coupled with an app, it is possible to turn a smartphone or tablet into a fully functional payment device.

VeriFone commented: "As retailers look to engage with today's more mobile-orientated convenience-focused consumers, most accept that multimedia, touchscreens, self-service mobile and tablet-based retail platforms are all now crucial to their long-term success."

According to PayPal, in the UK alone, 14 million adults regularly shop via mobile, and consumers will spend £2.5 billion (around $3.5 billion, or AU$5 billion) shopping on their mobiles in 2016 – a growth of 42% year-on-year.

PayAnywhere

Developing a mobile POS (Point of Sale) system for your business isn't complex. At the moment there are a number of options to choose from including:

What all these systems have in common is that they use a standard smartphone or tablet to connect a card reader to your business' e-payment systems. They offer a level of mobile payment freedom that many businesses are now realising can enable them to tap into the trend of swift mobile payments consumers are increasingly demanding.

Worth the outlay?

One of the concerns that all businesses have is the cost of these new payment systems, and whether this is actually worth the outlay. What is clear is that consumers are forcing the issue and demanding these new payment systems. Those businesses that stay ahead of the payment wave will be the winners.

Cost of course will vary between suppliers. The card-reading device that is either a standalone terminal or one that connects to a smartphone or tablet can cost between £29 for the basic device from iZettle, to around a hundred pounds for other hardware.

The ongoing costs will be determined by the level of sales that you will put through the systems. PayPal for instance has quite a complex payment fee structure, but generally your business would pay 3.4% plus 20p per transaction, which can fall to as low as 1.9% plus 20p for larger payment volumes.

Turning to iZettle, it uses what is called a 'Smart Rate' payment system, which begins at 2.75%. A business taking £5,000 in card payments with iZettle during one month will have a Smart Rate of 1.92%, saving them £41. A business that processes £13,000 in monthly sales will get a Smart Rate of 1.5%, saving £162.

Needs, costs and maintenance

Making decisions

With so many mobile payment options to choose from, selecting the one to adopt for your business is a matter you should approach carefully. Follow these steps to find the perfect mobile payment solution for your business:

1. Assess your customers' needs

If you are unsure which type of mobile payment system your customers would prefer – ask them! Polling your customer base will reveal how they shop and therefore which platform your business needs to adopt.

2. Talk to your bank

The banks of course have a close working relationship with all the payment providers. Speak to them about which systems they recommend to interface with your existing merchant account, and which ones provide the fastest payment methods, as you don't want to have to wait long periods before a mobile payment is credited to your account.

iZettle family

3. Consider all the costs

Look closely at the payments that your business takes at the moment. To get a clear idea of costs, you need to assess the number of transactions your business is likely to process with your new mobile payment system.

4. Trial the services

Once you have a shortlist of potential payment providers, you now need to test these in your real business. Assess how your customers adopt the systems, but also look at your payment workflow and the back office support you have to do.

5. Support and maintenance

When things go wrong how efficient is the mobile payment provider at resolving your problems? It's important that your business is fully supported across the payment methods it chooses to offer to its customers.

6. POS integration

Just having a payment method that attaches to a smartphone or tablet is all well and good, but how does this technology connect to other POS systems? Look for high levels of integration that will enable your business to expand its systems in the future.

SumUp

Conclusion

VeriFone concludes: "Thanks to new developments in technology, innovation will play an increasingly powerful role in retail strategy. For the consumer, these new platforms will bring the allure of greater convenience and better service – everything from electronic wallets on a mobile phone to the opportunity to easily cash in rewards and discounts electronically.

"For retailers, where image, promotions, seasonal pull and loyalty are important, new mobile and POS devices and applications will drive footfall with smart apps and engaging new services."

For most businesses, providing more mobile payment methods in-store or when on the move is going to be a big part of their future. Backed by existing payment infrastructures that themselves have tried and tested security, your business can adopt mobile payment methods today, ensuring you are ready to ride the wave of the new payments revolution.










Posted in Uncategorised

Updated: Bring Your Own Security: Protecting business data on every device

Updated: Bring Your Own Security: Protecting business data on every device

Introduction and intelligent defence

Does your business allow its employees to use their own phones and tablets at work? The so-called BYOD (Bring Your Own Device) and now WYOD (Wear Your Own Device) trend has continued to expand, as employees use their personal devices for work and play. Gartner predicts that by 2018, 70% of workers will be using personal smart devices at work.

What this has meant for business owners is a revisiting of their security policies and the protocols in use to ensure these devices and the information they contain are always secure. This is vital, as Kaspersky Labs has already identified 150,000 pieces of mobile malware which can compromise smartphones.

Gartner comments: "BYOD does increase risks and changes expectations for CIOs (Chief Information Officers). Unsurprisingly, security is the top concern for BYOD. The risk of data leakage on mobile platforms is particularly acute.

"Some mobile devices are designed to share data in the cloud and have no general purpose file system for applications to share, increasing the potential for data to be easily duplicated between applications and moved between applications and the cloud."

There are a number of issues to be considered when managing the security of BYOD across your organisation including:

1. No policy regarding the downloading and installation of apps

There are now millions of apps to choose from. Having no policy regarding which apps can and can't be installed opens any device to potential attacks from malware. Create a blacklist of apps which employees should never install on their phones.

2. Privacy versus monitoring

The ability of every mobile device to be tracked can raise privacy issues where BYOD is concerned. Few employees will wish their location to be tracked and monitored when not at work. However, businesses need to know where each device is, with geofencing setting parameters that state the device will only be monitored during office hours.

3. Monitor business usage

As a device could be used for personal and business calls and data exchange, it's important to track usage to ensure costs to the business are allocated correctly. This includes when the devices are used overseas to avoid excessive roaming charges.

4. Choice of device

The whole philosophy behind BYOD is that workers can choose their own device to use. However, security policy must dictate that this can't include jail-broken phones for instance or any other device that has not been authorised. Your security policy should include a list of devices that are approved.

5. Information is security

A security policy that isn't clearly communicated is of little use. Train your staff to ensure they are aware of their responsibilities under your BYOD security policy. And this isn't a setup and forget exercise. Monitor how BYOD develops across your business and modify your security policy accordingly.

These are the biggest security concerns when it comes to BYOD

In its BYOD security report [PDF], EY advises: "The risk of the device itself should be assessed as a part of the company's risk assessment framework. In some organisations a tiered device architecture may be viable to deal with varying degrees of risks tied to job functions.

"For instance, devices that are being used to present sensitive financial data to the board through a custom app will invariably be more sensitive to theft or accidental loss than a mobile device with access to calendar and email updates."

Intelligent defence

Now that your business has entered the post-PC era, ensuring every device used by your employees has adequate levels of security is vital. What's more, as workforces continue to become mobile and geographically dispersed, the use of mobile devices will expand.

Security policies must take account of this expansion, yet enable workers to use the same device in their private lives, as well as at work.

IT managers and CIOs need to look at how their existing security policies can be amended to maintain high levels of data security with BYOD. A policy can be modified in several ways:

  • A virtual desktop infrastructure (VDI) can be used to allow BYOD devices to securely access business servers without any cross-pollination of data that could include malicious code.
  • Decisions should be made on the level of access that devices will have to a corporate network. Businesses want to allow BYOD, but limits should be set and communicated to users.
  • The storage of sensitive data on personal devices can be allowed, but within limits set after consultation across users to strike a balance between day-to-day needs for data access, and the overall business security policy that includes compliance with data protection regulations.
  • Mobile device management (MDM) may at first glance seem to be the solution to security issues, but IT managers and CIOs should look closely at how MDM can be used to control a device environment that includes BYOD.
  • It is important to maintain endpoint security within a BYOD environment. Remote wiping of data, and on-board antivirus protection become essential, as it is easy for an infection to spread from a user's home network.
  • Using a private cloud environment to protect BYOD users and provide a single management console for IT managers should also be considered.

Pulse Secure further notes: "Where organisations have attempted to embrace BYOD with MDM suites or capabilities, they are often met with resistance from users that their personal devices are falling under the control of their enterprise admins.

"As such, 2015 should expect to see a shift from enterprises trying to manage and secure an entire mobile device via MDM to one of employing workspaces to secure only portions of the device that access and store corporate data.

"This shift will be an attempt to reduce tensions between enterprise admins and the personal device owners over who owns what data and what ability the enterprise has to secure data and lock and wipe devices at their discretion."

Current state of BYOD play

Risks and rewards

To gain an insight into the current state of BYOD security, techradar pro spoke with Garry Sidaway, SVP Security Strategy and Alliances at NTT Com Security, on a number of issues including the core security risks facing businesses and the advantages (or disadvantages) of wearables.

Garry Sidaway, SVP Security Strategy and Alliances at NTT Com Security

techradar pro: Are businesses paying enough attention to the security risks that BYOD/WYOD present to their organisations?

Garry Sidaway: Most companies have put in place controls and processes to manage BYOD, in particular mobile devices like phones and tablets, but wearables and connected devices aren't typically considered in an organisation's risk management strategy.

As more and more devices are connected, the security implications are massive. As always, understanding the real risk and putting risk in context is essential.

TRP: What are the core security risks that BYOD/WYOD present to businesses?

GS: The risks associated with BYOD/WYOD are the potential ingress and egress of information. Monitoring the current logs with the existing connected devices and security technologies is already becoming a huge challenge to businesses but, when you start to include unusual devices such as watches and TVs, the volume of data and false alerts could potentially be overwhelming.

This is before you even consider the skills required to regularly monitor and analyse such data.

TRP: Can businesses take any practical steps to minimise the security exposure that wearable devices present to their companies?

GS: Putting the risk in context is essential and to also put in place the necessary policies which should be an extension of plans already in place for BYOD. These should then be enforced with network and access control systems, extending protection to wearable devices which will typically be connected over Bluetooth or wireless.

Finally, look towards analysing logs effectively and efficiently which can be achieved through working with a Managed Security Services Provider (MSSP) who covers such devices.

TRP: Is there a fine balance to be struck with the advantages that wearable devices bring to businesses and their employees, and the organisation's need to protect sensitive information?

GS: As always with advances in personal innovation and business, there is a fine balance. Where the initial reaction to BYOD was negative from the security department, we have seen that businesses can benefit once wearables have been analysed and the risks understood.

TRP: What do you think wearable device security looks like?

GS: Wearable devices will typically connect through wireless connections and as such can be managed through traditional network access controls. The focus should also be placed on effectively managing the increase in log traffic.

Most of these devices will not be looked upon as a security risk but they can (and will) be exploited as any other connected device. TVs with microphones, personal monitoring and privacy, cars and fridges with no protection, are all potential entry points in an organisation's infrastructure.

But ensuring that these risks are put in context and understood before simply banning them is essential as businesses can enable innovation and personal efficiency.

Conclusion

There is little doubt that BYOD/WYOD will continue to impact on every business. As more sensitive information moves to consumer devices, your business needs a robust and flexible security policy to ensure data, networks and the transmission of this sensitive information is safe and secure.










Posted in Uncategorised

Updated: How to take advantage of mobile retailing

Updated: How to take advantage of mobile retailing

Introduction and the mobile marketplace

Note: Our mobile retailing article has been fully updated. This feature was first published in December 2013.

2015 is a tipping point for retailers and their customers. Where the internet has reigned supreme, with e-commerce transforming the retail environment, the rise of the smartphone will eclipse the massive success of e-commerce as m-commerce becomes the preferred way to shop.

Massive opportunity

With the love affair with apps showing no signs of diminishing, how can your business ensure it is ready to take advantage of a market that RetailMeNot estimates is worth nearly £15 billion (around $23 billion, AU$31 billion) in 2015 alone?

The UK m-commerce market is more than a fifth bigger than Germany (£12.4 billion) and 152% larger than France (£5.9 billion) – the largest markets in Europe, after the UK. Barclays is estimating a 9% expansion to £32 billion (around $48 billion, AU$67 billion) by 2019.

"Mobile is now the driving force behind e-commerce growth, accounting for more than one in four pounds spent online in the UK this year," says Giulio Montemagno, senior vice president of International at RetailMeNot.

"However the true impact of mobile on retail is much greater than this. Our research suggests that mobile is becoming a 'shopping companion' for many Brits. Almost three-quarters of mobile users regularly visit retailer's websites to browse or make purchases, with some retailers seeing as many as one in two visits to their websites come through mobile."

Nearly half of all e-commerce transactions in the UK are on mobile devices

In its report into mobile commerce, RSR concluded: "Just as they did with early attempts to sell their products on social media, retailers are learning that the mobile space is more about consumers arming themselves with valuable content that helps them to make the best choices to suit their lifestyle needs than it is about transacting (although consumers may choose to do that too).

"For consumers, mobile isn't a destination like a store or an e-commerce site. Instead it's both a way for them to express themselves and to become more independent. The challenge for retailers now is in how to participate in such a world in a way that helps build loyalty to the brand without being intrusive."

Spending across all retail channels shows growth on mobile devices

Twin pillars

For businesses, understanding who is using their mobile to buy and what they want to purchase are the twin pillars that support the burgeoning mobile retail marketplace.

According to research from Barclays, m-commerce sales are highest across entertainment and books, where mobile devices account for 17.1% of sales – and over half of mobile shoppers (57%) browse or research products at least once a week using mobile devices, and 25% purchase goods.

With smartphones now ubiquitous, retailers can expect their customers to own these devices

Consumers want to use their phones to shop – it's as simple as that. However, retailers are being slow to move their e-commerce offerings to mobile. Simply having a responsive website isn't enough, as consumers increasingly would rather use an app to make purchases and not visit a mobile website, as the latter invariably doesn't have a particularly user-friendly design.

App commerce and m-commerce checklist

App commerce

What is becoming increasingly clear is that the app will dominate mobile commerce. Apps are now used whenever a customer is in shopping mode. Often this will be to check and compare prices and features, but retailers are now making even closer connections using technologies like beacons, which identify a customer when they come into a store.

Linking mobile commerce to physical stores with beacons will become more and more commonplace

Expanding the experiences that consumers can have with their mobile devices is the future of m-commerce. Deloitte Digital concluded: "Our data found that consumers want to interact with retailers – evidenced by the fact that 30% of shoppers surveyed that used their smartphone on their last shopping trip used a retailer's mobile app or website.

"Our survey also shows that 74% of consumers surveyed who used a retailer's native app or site during their most recent shopping trip actually made a purchase that day, compared to only 66% who didn't use the retailer's app or site."

The use of apps as the primary way to access a retailer's online store will continue to expand. "The customer purchase journey has become increasingly complex as consumers have stopped using a single device to make their purchases," says Jonathan Wolf, chief product officer, Criteo. "Delivering an engaging app experience and connecting seamlessly with consumers across multiple devices are key to capturing e-commerce sales in this new world."

Having access to thousands of stores in their pockets no matter their location is a powerful shift in the customer/brand/retailer relationship. Businesses that can quickly evolve their e-commerce services to embrace the mobile space will become destination sites. There is still work to be done regarding how products and services are presented to customers, with payment options and security still a concern, but mobile is the future of retailing.

Your m-commerce checklist

Research carried out by Centre for Retail Research (CRR) for VoucherCodes.co.uk revealed over £6 billion (around $9 billion, AU$12.5 billion) is being lost by retailers due to a lack of investment in their mobile services.

Says Claire Davenport, media and internet, strategy and management, VoucherCodes.co.uk: "The growth of online and mobile spending has already had a hugely positive impact on the retail sector. However, there is still a great opportunity being missed – and it is worth billions for retailers. Customers have expressed their intention to spend more on mobile devices, so now is the time to revisit mobile strategy to capitalise on this."

And social media will also increasingly become a retail space. Already visual marketing across Pinterest and Instagram with embedded 'buy now' buttons on all major social media networks means retailers have a range of channels to reach their customers – all via a device they always have with them.

Innovations such as Apple Pay will resolve how goods and services will be paid for on mobile devices

Is your business ready to embrace the m-commerce revolution now taking place? Follow these four steps to ensure that it is:

Multi-screen is essential

Your customers now use multiple channels for researching and shopping. Integration with your website, mobile and in-store is vital and demanded by today's mobile consumers.

Personalised communications

With consumers checking their phones up to 150 times a day, there is plenty of opportunity to connect with them. Push notifications are a powerful marketing tool all businesses can use to reach out to specific customers about their goods or services.

Engage with content

With 4G now available to consumers, retailers can use rich content to showcase their goods or services. Video is the most popular type of content online – especially across social networks – so using video for your marketing can be highly effective.

Customer service

With a direct channel to your customers, high levels of personalised customer services have consistently been shown to improve sales and brand awareness.

Google states: "WWW now stands for "What I want, when I want, where I want it." This is true none more so than in the mobile commerce environment. There is no doubt that this retail landscape will expand and become the dominant way to shop – just make sure you and your business are ready.










Posted in Uncategorised

How to extend your phone, tablet or laptop battery life on the move

How to extend your phone, tablet or laptop battery life on the move

Introduction and battery packs

Making sure you have enough power for your gadgets when you are on the move is a constant headache. As the number of devices we all carry has expanded, so has our consumption of power. Britons alone throw away 600 million batteries every year, but batteries are no longer the only way to carry the power you need to keep your devices working all day every day.

When working on the move the importance of a reliable and plentiful supply of power is even more important. However, keeping phones, tablets and your notebook PC charged and working is only the tip of the iceberg. Today it's possible to create a mobile office that doesn't need a mains power socket to deliver truly off-grid working. And the need for power is clear with EE's recent Power Bar giveaway being a runaway success.

Battery packs

Basically, when creating portable power sources you have two choices: you can carry battery packs, or generate the power you need, when you need it. The number of portable battery packs is bewildering. These packs need to be small and compact, yet offer enough juice to make carrying them justified. Not all battery packs are made equal, which is where a bit of battery education can come in handy when choosing the right one for your needs.

All batteries have a mAh (milliampere hours) rating, which indicates how much power the battery can deliver for an hour. For instance, a 1000mAh rated battery can deliver that level of power for one hour of use. The practical upshot is that the higher the mAh number, the longer the battery will last. To work out how long a battery lasts for you simply divide the device's power usage by the mAh rating of the battery pack, and that figure is how many hours of power it can give you.

Zendure A8

In addition you will also see battery packs and chargers rated at 1A or 2A – this shows their capacity in Amps. Most smartphones charge at 1A, with tablets using 2A. If you are going to charge these devices with a third-party charger, it's worth checking the rating to ensure you get the same charging performance as you have experienced with their dedicated chargers.

The selection of battery packs is wide-ranging indeed. However, not all battery packs are the same, so it's important to match your needs to the right battery. When choosing the right battery pack, ask yourself these questions:

  • Which devices do you need to power?
  • How long will you be away from mains power?
  • What kind of recharging connector do they use?
  • Are the weight and dimensions of the battery pack important?
  • How much power do you need to carry?

At the heavy-duty end of the battery pack market is the EC Technology 2nd Gen Deluxe 22400mAh, and it offers masses of battery power, but it's heavy at nearly 450 grams (though slim with a thickness of 22mm). Or the Zendure A8 Pro offers 24000mAh in a 4cm enclosure weighing 480 grams.

At the other end of the spectrum is the Onaji Pawa Card that measures a svelte 92 x 58 x 4.9mm and weighs just 32 grams with a 500mAh battery. The Olixar enCharge boasts a slightly chunkier 2000mAh battery at 58 grams – and the Veho Pebble Smartstick offers 3000mAh charging in a pack weighing 80 grams.

Battery packs are also being built into all manner of objects. Some of the most useful for business users and individuals that want something a bit different are bags and holdalls. Phorce (pictured at the top of this article) is a great example – the Pro version offers 26000mAh battery capacity with all the connectivity you'll ever need. However, the bag is pricy at £449 (around $700, or AU$880). And the Everpurse uses wireless charging to recharge a built-in battery.

Of course making sure you have enough power for your phone, laptop or tablet is your priority, but there are a number of peripherals that can also be powered without access to a mains supply.

When you need to print on the move Canon offers the Pixma iP100, a compact inkjet printer that runs completely off battery power. The HP Officejet H470b is a compact printer that can run from mains, battery or USB.

Scanning on the move is also now possible with a number of battery operated units available including the Doxie that have built-in memory and Wi-Fi allowing connection to any device. VuPoint Solutions also have a range of 'wand' scanners if you want a unit that is ultraportable.

Powermonkey

Make your own power

Charging a battery pack is a road warrior's first instinct, but what if you could generate your own power and really go off-grid? Renewable power in our context means solar.

Today there are a number of products that can offer a level of power security if you will be away from mains power for lengthy periods of time. Or if you want to do your bit to protect the environment, solar charging is the way to go.

There are also a number of solar charging cases for your phone. Good examples include Juse, WakaWaka, and XD Design has a number of models to choose from including a compact unit that sticks to a window.

Folding solar panels have also been available for some years. SunJack is a good example, as is Powermonkey from Powertraveller. But if you want to get serious about generating your own power, the Expedition from Powertraveller is the ultimate in self-generating power sources, but it'll cost you about £450 (around $700, or AU$880).

Tylt Energi

When you need to carry a load of stuff and keep it all charged, the TyIt Energi backpack is ideal. Voltaic Systems have also been supplying backpacks with built-in solar panels for years.

In addition to the usual suspects, there are also a number of more exotic ways to generate power when on the move – the hydrogen fuel cell has been promised as a power source pretty much since the arrival of portable devices. But today this promise has been largely realised. The myFC is an ultraportable fuel cell that is designed to be as convenient as your smartphone. The MiniPak is also a handy unit. All you do to generate power is insert a Hydrostik hydrogen cartridge into the main unit to charge using USB.

Digital nomads

Of course you can also be more proactive with the power you do have when on the move. There are plenty of practical steps you can take to conserve battery power:

1. Go darker

The brightness of the screens on your devices can be a major power drain. Turn the brightness down as much as you can.

2. Turn off services

Having Bluetooth and Wi-Fi switched on means your phone or tablet is constantly scanning for any devices within range. Only switch these services on when you need them.

3. Check your apps

Some apps, such as Facebook, are always on, so constantly checking for updates. This puts a strain on your battery.

4. Don't vibrate

You might be used to setting your phone to silent/vibrate, but turning off vibrate is a great way to save some significant battery life.

5. Shorten auto-off

With most people checking their phones over a hundred times a day, shortening the time it takes for your smartphone to turn off the screen can easily add up to a significant amount of time, and this can help save some drain on your battery. And try using an app like DynamicNotificaitons (Android) to see notifications without switching on the screen.

myFC JAQ

Future of battery tech

As we've seen, when you are away from mains power or need to work completely off-grid for lengthy periods of time, there are many battery solutions to choose from. But what about the future?

Already smartphones have begun to appear with larger capacity batteries. Acer recently launched its Liquid X2, which has a 4000mAh battery that is a third larger than comparable Samsung and Apple phones. Last year also saw the launch of the Xenium W6610 sporting a 5300mAh battery – but the leader at the moment is the Elephone P5000, which has a battery capacity of 5350mAh.

Simply trying to squeeze a larger battery into a phone handset without the form factor looking like you're holding an iPad to your ear clearly has its limits, which is why so much effort and money is being poured into finding new battery technologies. Recently Stanford University has shown details of an aluminium graphite battery that could offer one minute charging for a smartphone. And StoreDot has also shown off its fast charging technology.

Pushing existing lithium-ion battery technology could also deliver vastly improved performance, at least that's the claim of Qnovo which is going back to basics and revisiting the chemistry that today's batteries use. If successful they claim to cut recharging times by up to 75%.

The massive growth of the wearable device market is also pushing new battery technologies with wearables powered by your movement, and even foldable batteries to deliver still smaller, lighter and thinner devices.

What is clear is that our appetite for power shows no signs of diminishing. There are, however, several technologies that together can deliver all the power you need when on the move. Whether it's to stay connected with friends or family, or to work in remote locations, portable power is readily available. And with new battery technologies just around the corner, the days of running out of power at the most inopportune moment will become a thing of the past.








Posted in Uncategorised

Clean machines: how to look after your tech and avoid bacteria bombs

Clean machines: how to look after your tech and avoid bacteria bombs

Take a look at your computer, phone and tablet. The chances are they are encrusted with dirt, grease and are home to some germs that can be harmful to your health. Forget that old clichéd quote regarding our toilets being cleaner than our kitchens – nowadays, our smartphones contain ten times more bacteria than our toilet seats. This isn't surprising, as our bathrooms are regularly cleaned, but when was the last time you even wiped a cloth over your tablet, laptop, keyboard, TV or games console?

Researchers have discovered a range of bacteria living in the tech we use on a daily basis. The habit of eating at our desks coupled with poor tech hygiene has meant bugs such as staphylococcus aureus have been found, which can cause upset stomachs, leading to the illness being dubbed 'Qwerty tummy'.

And in an office environment, food crumbs can attract mice and other pests, which in turn leave droppings, which offer an even richer breeding ground for germs. In one reported case a keyboard was so badly infected, it was ordered quarantined, as it contained 150 times the acceptable levels of bacteria. You can take a test to see how many germs are potentially living on your keyboard right now at CyberClean.

Dirty keyboard

Simple cloth and water

The approach you take to cleaning your devices will largely depend on how soiled they are and how much you want to spend on cleaning products. The Wall Street Journal for instance found that a microfiber cloth and plain tap water was the best for cleaning screens – no fancy solutions were used. However, it has been shown that a 50/50 mix of water and white vinegar can be highly effective at cutting through grime and grease.

Care should be taken, however. There are rugged examples of technology, but most of the devices we all use on a daily basis need to be treated with care, especially when cleaning them. Pressing too hard on your LCD TV for instance could burn out a pixel. And think about the basic tools you will need. As already mentioned the microfiber cloth is vital. Don't use cotton wool for instance. You might think it feels soft to the touch, but it's abrasive to delicate screens.

Okay, let's discuss in detail how to spring clean your various bits of hardware…

Stop!

First off, check the manual for your tech before you begin scrubbing, as some cleaning products could damage your sensitive devices. And any special screen coating could be wiped away if the right cleaning product isn't used. Most smartphones have what is called an oleophobic coating, which is designed to reduce fingerprints. Using the wrong cleaning products could damage this coating, and make your phone or tablet even more susceptible to dirt and grease.

Turn off your tech

Make sure your PCs, tablets and phones are off before you begin to clean them. This is especially important to avoid damaging your keyboard. Keyboards will often have to be dismantled before they can be cleaned properly.

YouTube : https://www.youtube.com/watch?v=QRwtf1Yq25w

Remove the debris

Target the loose dirt and other detritus that has accumulated on your keyboard or other peripherals first. Use canned air to remove any stubborn debris. Don't blow on your keyboard (or other device) as your breath is moist and you just spray droplets of saliva onto your hardware. A product like Cyber Clean is ideal for this task. OXO also has a handy cleaning brush (see the above video) made from silicone that is retractable to protect it.

Liquid cleaners

Don't use household cleaning products as many contain bleach, which can damage sensitive equipment. The cleaning solutions from companies such as Muc-Off and iKlear have been specially formatted to effectively clean electronic devices. And don't spray the cleaner directly onto your device. Spray onto a microfiber cloth and then apply to your tech. The Stylus Pro is a liquid spray, cleaning cloth and stylus all in one device, which is great for cleaning on the move.

Be gentle

If your tech is very soiled avoid the temptation to scrub too hard, as many screens now have anti-glare coatings. If you polish these coatings too much they can become shiny defeating the whole point of them. Use microfiber cloths at all times as their surface isn't too abrasive. Be careful when using products like Mr Clean Erasers, as they are basically very fine glass paper. Moshi offers a Terahedron microfiber, TeraGlove, which is designed to fit over the hand for perfect cleaning.

Kill the bugs

One of the issues with a build-up of dirt is that this can become a breeding ground for all manner of nasties. One of the best ways to deal with this is to invest in a UV light box. These are used to sterilise toothbrushes, but larger ones can be used to sterilise smartphones, keyboards, mice and any other smaller devices. Search eBay (Germix brand name) for a range of UV sterilisers.

Prevention is better than cure

Stopping your tech from getting dirty in the first place is also an option. There are many keyboard protectors as well as screen shields for touch devices. Suppliers including Protect Computer Products and even sealed peripherals from Seal Shield stop any dirt or germs reaching your devices. It is also possible to buy keyboards and mouse pads coated with an anti-bacterial called Microban.

Dirty smartphone

Don't touch

Of course you can cut down drastically on cleaning by not touching the screen of your devices at all. When Steve Jobs unveiled the iPhone in 2007 he said that no one wants a stylus. Using a stylus, however, keeps fingerprints to a minimum.

Inside and out

Giving the outside of your tech a quick wipe down may be enough to make it cosmetically clean, but think about what could be lurking inside. Any device with a fan will inevitably let dust into the casing. Over time if this isn't removed it can lead to serious faults and of course all this dirt is yet another breeding ground for bugs.

Carefully open your device and use a vacuum cleaner if it has a very narrow hose head to remove the majority of the dust. Then use a soft paintbrush for any crevices the vacuum can't reach. And finally, canned air (available from Poundland) will blast away the remaining dust particles.

Cleaning your tech should become a habit you get into. Don't leave it months or even years between cleans, as this can lead to a serious health hazard in some extreme cases. Invest in the right cleaning tools for the tech you have, and to ensure your devices stay as clean and shiny as the day you unboxed them.

Image Credits: Ulrich Peters, Anne Helmond, Anssi Koskinen








Posted in Uncategorised

Business on the move: how to secure 4G and public Wi-Fi connections

Business on the move: how to secure 4G and public Wi-Fi connections

Introduction and 4G security

Working on the move is now commonplace thanks to advanced mobile digital technology. Being able to connect to the internet anywhere and at any time has become an essential business service.

The plethora of Wi-Fi hotspots offer fast and cheap access. However, for business users, security must at all times be of paramount importance, which is why many mobile business users are moving away from using Wi-Fi to the range of 4G access services that are now available.

F-Secure states: "Public Wi-Fi simply wasn't built with 21st century security demands in mind. When you use public Wi-Fi without any added security measures, you leak data about yourself from your device."

So if public Wi-Fi is simply too insecure for business users, what's the solution?

As the mobile phone networks have improved, speeds have moved past what can be expected with an average Wi-Fi connection, making 4G the new connection channel of choice for fast and secure internet access on the move.

Advances in mobile connectivity offer speeds of up to 60 megabits per second in some places, which is far greater than can be expected with the average Wi-Fi connection, especially if you are trying to use a particularly busy Wi-Fi hotspot.

The speed and convenience that 4G connections have delivered to business users in particular has meant their popularity has rocketed – so using 4G securely is now a priority. There are a number of simple steps you can take to ensure your 4G connection is always safe and secure:

1. Install mobile security applications

When using mobile devices with 4G always ensure you have adequate protection installed. McAfee Mobile Security is a good example and is available for Android and iOS devices.

2. Take care with automatic updates

If you are in the habit of simply downloading each new update you are offered for your 4G devices, start to assess where these updates are actually coming from. Ensure each update is legitimate and from your 4G service provider, and isn't malware disguised as an update. Android 4.3 removed automatic updates, so take a look at the version your devices are running.

3. Use a mobile VPN (Virtual Private Network)

To ensure that sensitive data is protected as it moves to and from your mobile devices, setting up a VPN is an ideal solution. Both Android and iOS support the use of VPNs. Windows and OS X also have a range of VPNs to choose from.

4. Use strong passwords

The password may still be the bane of many users' lives, but they are still the main way that Wi-Fi login is enabled. Develop a strong password regime and don't use the same password for all your logins. There are many password managers to choose from – we've rounded up the best of them in this article.

5. Forget the Wi-Fi network

Try and get into the habit of connecting to a public Wi-Fi hotspot for the shortest possible time. When you have finished ensure your device forgets the network. This prevents your device becoming vulnerable when you are not using it yourself.

It is now a commercial imperative to ensure that all the devices that you use over a 4G network are protected by the latest anti-malware applications, and that every live connection you make to the internet is done over a secure channel encrypted to combat any eaves dropping. When working on the move, security should be your top priority.

Securing public Wi-Fi

If there is no option but to use a public Wi-Fi hotspot, follow these steps to ensure your connection is secure:

1. Connect using a reputable Wi-Fi provider

Think about where the Wi-Fi hotspots you use are located. Are these connections legitimate? Check the credentials of the service provider before you connect and transmit or receive sensitive information.

2. Use a VPN

As we've already mentioned, one of the easiest ways to ensure your data is safe and secure is to always use a VPN. Today these are efficient and straightforward to use. Some good examples are Avast SecureLine, proXPN or Hotspot Shield.

3. Only connect with secure websites

When you are working try and resist the temptation to check your Facebook profile, or do some online banking. These are the websites cybercriminals target to gain personal information they can exploit. If you need to connect to these sites, use a service such as HTTPS Everywhere to encrypt your connection.

4. Install antivirus and malware applications

The connection you choose is only half of the security issue you face. Often, malware will infiltrate your notebook or phone and begin to crack your passwords. Keep your security applications up-to-date at all times.

5. Turn off all sharing options

At home you probably share your computer with a printer or maybe even an external hard drive. When you're using a Wi-Fi hotspot turn off the sharing options, as these can give cybercriminals an open door to penetrate your computer.

6. Monitor the apps you use

As apps have become so popular on mobile devices, cybercriminals use installed apps as a doorway into your phone or tablet. If one of your apps begins to behave strangely, delete the app immediately, as it may have been hacked.

7. Never jailbreak your phone

This activity may offer new apps to try and use, but jailbreaking a device will instantly disable the built-in security. Only use apps that have come from a legitimate source on a phone or tablet that has not been modified in any way.

8. Turn off Bluetooth

Switching off Bluetooth when you are not using it is a sensible option as it closes one channel that could be used to hack your device. It also saves battery life.

9. Encrypt your sensitive data

All the data that moves over a VPN will be encrypted, but if you don't have a VPN available, encrypting your emails, for example if they will contain attachments with sensitive information, is a sensible precaution to take.

Anatomy of a Hacked Mobile Device

The Sophos Security Threat Report from last year concluded: "We have continued to diversify the devices in our environments, and those devices hold sensitive business data. The security ecosystem simply is not as well developed around such devices as the traditional PC environment."

There is no doubt that 4G now delivers fast data connection speeds that are highly attractive to business users. It is, though, essential to become more security conscious, as 4G connections will increasingly become the focus of cybercriminals.








Posted in Uncategorised