The Meridian Blog: Tech News, Tips & More for SMB and Enterprise Environments

Five Mobile Security Myths Busted

Robert Bruce

Posted by Robert Bruce
Wed, Jul 01, 2015

One of the fastest-growing new trends in the last decade, Mobility has taken hold in both enterprises and SMBs — and it's not hard to understand why.

Combined mobile device use recently surpassed personal computer (PC) use, and this rapid adoption of mobile technology has led to a number of misconceptions and downright myths about their place in the office, as many businesses still lack a comprehensive mobile strategy. In an effort to dispel some of the fallacies about mobility in the enterprise, here is a brief look at several of the more common mobile myths.

Read More

Your Biggest Threat to BYOD Security Could Be Your Employees

Jan Carreon

Posted by Jan Carreon
Tue, Apr 21, 2015

When the cellular phone was first introduced, it served only one purpose — to make and receive phone calls. Over the years, we have watched the device evolve and incorporate more and more features. Its evolution changed the way we communicate with texting, video chatting, and email capabilities. It has replaced everyday items such as watches, calendars, the boom-box, CD/mp3 players, books, and cameras. It’s next victim? The wallet.

RELATED: What Does Apple Pay Mean for Security and Business in Washington, DC?

A cellular device is arguably a one-stop shop for almost everything, and a necessary tool for professionals today.

Mobile devices are a staple in today’s world, contributing to the rise of BYOD (Bring Your Own Device). By now, you are probably well aware of some of its advantages and disadvantages. One of the biggest concerns of BYOD is security, with the largest threat arguably being a company's employees. Here are the ways employees are unintentionally making sensitive work data more vulnerable to a breach.

Read More

A 5 Step Mobility Plan for Small & Medium Businesses in Washington, DC

Robert Bruce

Posted by Robert Bruce
Tue, Apr 14, 2015

The work environment is changing.

Few of us still work in a TV sitcom setting like 30 Rock or The Office. The days of being chained to a desk are rapidly evolving into a mobile workplace where we're rarely tethered to more than a tablet, laptop, or smartphone. In fact, it's estimated that about 38% of the world’s workforce will be mobile by the end of this year, if not more.

Nearly all industries, from health care, to legal, to construction and more, now find themselves out of the office and “in the field.” Yet, most still must keep up with paperwork, participate in meetings, and give and receive feedback. Large enterprises have been adapting for years, so how do small to mid-sized businesses in our nation's capital keep up?

It takes a strategy to successfully move from the stationary 20th century office to today's mobile workplace. For an SMB without the strategic direction of a CIO or VCIO, a consultation with a managed services provider (MSP) is a great place to begin.

To create a similar framework to that of large enterprises on their own, SMBs should follow these five steps:

  1. Needs
  2. Infrastructure
  3. Implementation
  4. Preparation
  5. Documentation

Read on to learn more about each of these vital steps.

Read More

Managed IT Services are the Answer to DC's BYOD Security Challenges

Robert Bruce

Posted by Robert Bruce
Thu, Oct 16, 2014

In my lifetime, I have seen some big changes in information technology. And, like most learning curves, each innovation feeds the next wave of discovery and application resulting in exponential growth.

It took a long time from the invention of the typewriter in the 19th century (no, I was not alive then) until word processing and personal computers arrived in the 1980s. It took a lot less time for the Internet to enter the modern office. Now, in less than a decade, mobile devices have become the norm in most offices.

I don’t know what The Next Big Thing will be — wearable devices, ubiquitous videophones, nanotechnology, who knows? But, I bet whatever turns out to be the next wave of IT office tools, it will be mobile. Which means that managed service providers (MSPs) will need to not only service their clients’ current needs, but to anticipate their future priorities.

Read on to learn more about the new challenges that come along with mobility and BYOD, and how Managed IT Services can help businesses manage and meet those new demands. 

Read More

What Does Apple Pay Mean For Security and Business in Washington, DC?

Juliana Lee

Posted by Juliana Lee
Tue, Oct 07, 2014

There is a lot of buzz about Apple Pay and its potential applications and implications. Personally, I wish they had called it "iPay," but unfortunately they didn't consult me about the name.

Many speculate that Apple Pay will revolutionize the payments industry and may even replace traditional wallets. However, others report on potential security and business implications that could hinder its success.

As one of many early-adopters who pre-ordered an iPhone 6, I decided to dig deeper into the news and rumors about the soon-to-be-released Apple Pay. Overall, the outlook for Apple Pay seems promising, but will it live up to the expectations and actually catch on?

To me, it sounds great—I could ditch my traditional wallet and free up some space in my purse? Sign me up! But, in recent years, plenty of other mobile payment methods have come and gone—think of the credit cards that only require a "tap" on card readers, key chain sized cards, Google Wallet, and others. If none of those novel, convenient payment methods took hold, what makes Apple Pay different? The jury is still out.

Read on to learn more about how Apple Pay will impact DC businesses, including security benefits and concerns, as well as implications for BYOD.

Read More

Windows, Android or IOS: Which Smartphone Should an SMB Choose?

Robert Bruce

Posted by Robert Bruce
Tue, Sep 16, 2014

"The Big Three" used to mean GM, Chrysler and Ford. Now it's Microsoft, Google and Apple who in some degree or another are a part of nearly everyone’s life. From our Smartphones to our tablets to our personal computers both at home and in the office, it is the rare human being in the 21st Century who daily does not encounter a product produced by one or all of these companies. In less than a decade, just one item, the Smartphone, has become as important to most enterprises as our desktop computers used to be. Choosing the right Smartphone and operating system is an important business decision. Whether it’s Apple’s IOS, Microsoft’s Windows, or Google’s Android, the compatibility of a Smartphone’s operating system with the rest of an IT infrastructure is critical. So how do these three operating systems compare with each other?

Read More

Mobility and Cloud Computing: a Natural Fit, but Enterprise Policy Needed

Juliana Lee

Posted by Juliana Lee
Tue, Sep 02, 2014

It is no coincidence that the rapid expansion of cloud services and the near ubiquitous presence of mobile devices has occurred virtually simultaneously. To me, the two go together like strawberries and cream, peanut butter and jelly, Hot Tamales and popcorn at the movies. There is a synergy to the two technologies that is fueling a communications revolution. But with the convenience of having our data travel with us, comes a price.

Read More

7 Simple Steps for Smartphone Security

Robert Bruce

Posted by Robert Bruce
Tue, May 13, 2014

Sometimes I think my smartphone is smarter than me. It certainly has a better memory. What would I do without Google or Wikipedia? I have nearly unlimited information and capabilities instantly available in a package smaller than a deck of cards. Smartphones are now as powerful and functional as computers. Sometimes, I even make a telephone call with one. According to Microsoft, smartphones now outnumber personal computers and are the most commonly used device for accessing the Internet. Basically, the smartphone is now an extension of the desktop. This can be a boon to enterprise productivity, but it carries complex security challenges. Knowing that smartphones often contain sensitive company data, as well as personal information, cybercriminals are constantly devising new, malicious tactics to gain access to them.

Read More

Five IT Trends and Challenges for Tomorrow’s Office

Robert Bruce

Posted by Robert Bruce
Thu, May 08, 2014

Spring has sprung here in the Nation’s Capital and the cherry blossoms are in full bloom—and so are the hot dog vendors. The chili dog I had in front of the Smithsonian Museum this weekend was remarkable for two reasons. One, it was an authentic New York wiener with the crisp outer casing that I like. Two, the vendor was updating his inventory on a tablet computer as he served up my dog. I love the fact that a small businessman can now take his office with him.

Read More

The Big 4 of Mobile Printing Platforms

Robert Bruce

Posted by Robert Bruce
Thu, Mar 20, 2014

The modern office has few boundaries. The freedom to create documents, edit spreadsheets, and print them on the go has given a whole new meaning to telecommuting and the mobile workplace as a whole. Not only can I write this blog on my Windows 8.1 tablet while enjoying a cappuccino at my local coffee shop, I can connect to their wireless network and print out a hard copy on their multi-function printer (MFP).

Read More
1
2

Leave A Comment

About this blog

News, best practices and more to help you get the most out of your office technology. Whether you're an SMB owner who wears a lot of hats, or an enterprise IT director, facilities manager or just someone who wants to work smarter — this blog has the resources you need to maximize the business impact of all your tech investments. Be sure to subscribe to receive email updates about new posts!

Download our eBook

 
DM_Workbook_Cover_Page.jpg

Download

Sort Posts by Topic

see all