Monthly Archives: March 2014

Three Mobile Device Management Realities

By | Information Technology | No Comments

  It’s time to upgrade your company’s mobile infrastructure. Before you make the investment, familiarize yourself with some of the high-level issues you may face when making the transition. You Will Only Upgrade Some of Your Mobile Infrastructure It’s common to start an upgrade with certain key employees for budget’s and sanity’s sake. It is also possible that only certain…

Read More

The Most Painful Document Versioning Scenarios

By | Enterprise Security | No Comments

Collaboration in the digital workplace is the new norm. With many employees often contributing to a single file, version control has been a management pain point for the last two decades. Oddly enough, while the problem has gotten more complex, the solutions have not. Here’s our list of the most common versioning scenarios that cause organizational headaches and network inefficiencies….

Read More

Read Your Cloud Storage Terms of Use and Prepare to Be Shocked

By | Enterprise Security, Facts About the Cloud | No Comments

Before you endorse an on or off-premises file collaboration solution, be sure to read the terms of use and privacy policy pages. What you find may save you time and prevent legal exposure. And if you are already aware of the potential downside to these multiplying solutions, keep in mind that your employees may not be. Check out our recent…

Read More

Is This Starbucks Secure? Remote Wi-Fi Network Security Checklist

By | Enterprise Security, Secure File Transfers, Security How To | No Comments

Helping your employees understand how to keep company files secure is a big task. Simple decisions they make while on the road can mean the difference between another day on the job or a privacy gaffe. Aside from implementing a secure collaboration solution, we’ve compiled a list of some of the biggest security to-dos. Turn off File-sharing While it may sound straightforward…

Read More

Rogue Enterprise File-sharing Systems and the Parable of Netflix

By | App Security | No Comments

Your company has established file-sharing systems and protocols. You provide ample training time for your employees on said systems and protocols. You think that you have done everything you can and that now your corporate files will be secure. There’s just one problem: in spite of all of the work you’ve done, the majority of your employees are still using…

Read More
Sound exciting? Try Arc for free now! Get Started