Posts tagged with "ISEC7 Group"



27. January 2022
Understanding the Log4j Vulnerability
On December 9th, 2021, a Log4j vulnerability was published and later to be designated CVE-2021-44228, and if exploited, it could allow hackers to remotely execute code on affected systems, an action called remote command execution.
13. January 2022
X-ray of a Successful Small Medium Business (SMB) Digital Workplace Strategy
What is a digital workplace strategy? A comprehensive digital workplace strategy is more than just a collection of solutions that allow employees to work from anywhere, from any device, at any time. Your comprehensive digital workplace strategy must provide everyone with the right combination of tools, solution platforms and services, as well working methods to improve the work experience and foster collaboration, ultimately improving productivity and efficiency while always ensuring and...
30. November 2021
Demystifying Technology: Virtualization Beyond Servers
Virtualization is a well-proven technology used for decades by corporations to deploy servers internally using Virtual Machines (VM) and transparently provide services like corporate email, database, and other applications/services to their employees. The function is the same as if it were running on hardware-based servers, but with advantages like quicker provisioning and deployment, lower hardware costs, better resources distribution, portability, and migration, to name a few.
16. November 2021
The Year in Review, and Looking Forward to 2022
After an unconventional year like 2020, with an unexpected pandemic putting the whole world on a hold, 2021 was largely expected to be back to “business as usual” with employees returning to the office as vaccines became available and the threat of COVID dwindled.
03. November 2021
Demystifying: Apple, Android for Enterprise, and Samsung Knox for Your Enterprise
It’s safe to say that in today’s world everyone has gone remote, with users accessing data online from different devices like smartphones, tablets, and laptops. In previous blog posts, we’ve discussed how UEM solutions are ideal when it comes to ensuring the security of data and devices that are operating remotely. However, Apple, Google, and Samsung also offer their own services and tools to help manage their devices and protect their data. Let’s break down their...
19. October 2021
Security Maturity Model Part 2
How do you provide cybersecurity for an already complex ecosystem? How do we keep it simple for the end-users, so they don’t circumvent protocols put in place designed to protect them and their devices? Continuing our Security Maturity Model blog series, we’re looking into the incremental needs of larger organizations, or an organization spread out globally. How do we stay secure, while still providing seamless access to resources within the ecosystem and...
14. October 2021
Security Maturity Model
When it comes to businesses and enterprises, cybersecurity is predicated on multiple factors – whether it be the number of employees, how the environment is deployed, potential attacks and attack vectors, the type of devices used in the ecosystem, or the corporate device usage policies. On top of these factors, there is a vast array of security solutions to choose from, each claiming to protect your ecosystem and avoid costly downtime or – even worse – damage to your reputation. We will...
28. September 2021
New iOS 15 Enterprise Features: Everything You Need to Know
At their latest Worldwide Developer Conference (WWDC) this past summer, Apple announced several new features in their soon-to-be-released iOS 15, noting an emphasis on communication changes and on-device intelligence. For this article we will focus on the new enterprise features, allowing easier and more advanced management of end-user devices while simultaneously improving the end-user experience and privacy. 
18. August 2021
Android 12 for Enterprise: Everything You Need to Know
While predominately offering new consumer-focused features, the forthcoming Android 12 for Enterprise has also markedly streamlined security and privacy to make management even easier for its users.
20. July 2021
BlackBerry Cyber Suite
In our last article, we talked about behavior-based security, a whole new approach to answer today’s security challenges by preventing an attack before it even happens. This may have seemed outlandish even a few years ago but is now a reality thanks to progress made in areas like Artificial Intelligence (AI), Machine Learning (ML), and Big Data technologies, providing the tremendous computational power required to finally get in front of an attack.

Show more