ZDNet
  • Follow via:
  • RSS
  • Email Alert

Consumerization: BYOD

There are no sacred cows to someone who believes that consumer devices and self-service IT are the keystones of the new business model. IT Apologist Ken Hess takes on Consumerization and bring your own device.

Ken Hess

Kenneth 'Ken' Hess is a full-time Windows and Linux system administrator with over 15 years of experience with Mac, Linux, UNIX, and Windows systems in large multi-data center environments.

Latest Posts

Are Apple's famous defectors going to have an impact on the popularity of iPhones?

spacer

What if someone famous switched from iPhone to Android? What about two famous people? Andy Ihnatko and Guy Kawasaki both have taken up residence with Android phones. What's the world coming to?

published 1 day ago by Ken Hess

36 Comments Vote

Building dependencies on free apps and services is bad practice

spacer

How many times have you seen free services disappear, switch to non-free, restrict you too much or have no value — even free of charge? I've seen it more than I want to admit to.

published 1 day ago by Ken Hess

12 Comments Vote

What's up with Apple's down low on eBay sales?

spacer

Apple's eBay store is something of a mystery. Cheaper prices (mostly) on its refurbished hardware. Is there a story here? Inquiring minds want to know.

March 8, 2013 by Ken Hess

35 Comments 1 Vote

10 security best practice guidelines for consumers

spacer

Consumers need to proceed with extra caution to avoid scams, viruses, social engineering attempts, privacy-leaking apps, and malicious software of every flavor. These guidelines will keep you on the straight and narrow.

March 5, 2013 by Ken Hess

7 Comments 1 Vote

10 security best practice guidelines for businesses

spacer

Businesses need extreme security measures to combat extreme threats. Here are 10 best practices that provide defense against the majority of all security threats.

March 4, 2013 by Ken Hess

2 Comments Vote

Don't you just love mobile apps? So do malicious code writers.

spacer

There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.

March 3, 2013 by Ken Hess

3 Comments Vote

The second most important BYOD security defense: user awareness

spacer

Outside of the IT department, most users think that viruses are the only threat to their computing equipment. Many believe that malware doesn't affect mobile devices at all. An educated user is a safer user.

February 24, 2013 by Ken Hess

4 Comments Vote

Can RIM's BlackBerry 10 bring it back from the brink of obscurity?

spacer

In a mobile security challenged world, Blackberry 10 might be just the ticket we've all been waiting for. Could it be that RIM is back in the game? Could be.

February 21, 2013 by Ken Hess

42 Comments 1 Vote

10 things you can do to boost your BYOD security

spacer

If you're going to allow users to bring their own devices, find out what you can do to maintain security and be a happier you. These ten security recommendations will help you do both.

February 20, 2013 by Ken Hess

6 Comments Vote

Android security suffers the slings and arrows of outrageous fortune

spacer

Android's overwhelming popularity may be its undoing. Malware against Android exceeds threats against Windows. The threats are bigger and more is at stake than ever before.

February 15, 2013 by Ken Hess

35 Comments 4 Votes

View more articles
CNET Join | Log In | Privacy | Cookies Close
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.