When It Makes Sense To Restrict Device Choice

We’ll be devoting most of this ebook to looking at how you can expand device choice in a secure fashion, but it’s worth recognising that there are scenarios where limited device choices can make sense. We don’t want to suggest this is the norm — if only because you’re likely to experience passive resistance in the form of people bringing their own devices anyway — but there are occasions when it can make sense.

Laptops, Convertibles, Tablets: Which Should You Choose?

Even if you’ve decided that mobile phones will only play a relatively minimal role in your environment (calls, texts, emails and basic browsing), your mobile choices have only just begun. The conventional laptop still plays a vital role, but now competes with tablet machines and hybrids (which can convert from tablet to laptop form as needed) for corporate attention. Here’s our take on when each form factor makes sense.

How To Save Money Buying Mobile Devices

While prices continue to drop thanks to Moore’s Law, investing in mobile devices — whether that’s for laptop PCs, tablets or phones — still represents a major capital outlay. Follow these guidelines to cut down on needless expenses.

Get Lifehacker's 'Making Mobility Real' Ebook For Free

How can you take advantage of the benefits mobile technology offers while minimising the security risks? Our new free ebook Making Mobility Real has the answers.

Why Data Matters More Than Devices

Because individual mobile devices are often expensive, the focus for individuals is frequently on physical security. While this is understandable, it’s utterly meaningless from a business perspective.

The Top 5 Rules For Mobile Security

Mobile security ultimately relies on a mixture of smart technology choices and well-communicated policies. These are the key rules you need to remember.

Should You Let Staff Choose Their Own Devices?

One of the most fundamental questions facing any business looking to update its mobile strategy is this: should you let your staff choose whatever technology they like and offer to support it, or instead force them to pick from a more restricted list? Let’s weigh up the pros and cons of each approach.

Building An App Is Not Always The Answer

During the time when I worked in IT, one of my least favourite situations was when the business showed up with a answer before they’d really understood their questions. Forrester vice president Josh Bernoff dives head-long into that territory, with a focus on mobile development in a recent blog post.

How We're All Coping In The Mobile Cloud

According to Lillian Tay, a principal research analyst with Gartner, smartphones are becoming the hub of cloud services and tablets have created a new paradigm for computer usage that has never been seen or thought before by consumers.

Use The Pareto Principle To Manage Mobile Security More Effectively

The Pareto principle argues (in simplistic terms) that 80 per cent of effects derive from just 20 per cent of causes. The 80:20 rule can be a useful approach to adopt when you’re trying to devise mobile security strategies, especially as bring-your-own-device (BYOD) creates an ever-diversifying stream of devices that need to be controlled.