Wireless Watchdogs is Moving to New Company Headquarters!

Wireless Watchdogs Headquarters

CALIF. — July 5, 2016 – Wireless Watchdogs has purchased a 14,566-square-foot office/flex building in Inglewood for an undisclosed sum. The building is located at 317 S. Isis Ave. It was built in 1985. The wireless expense management firm plans to renovate a portion of the office space to use for its corporate headquarters. Ryan Harding of Newmark Grubb Knight Frank represented the buyer, while the seller, Altemus Co., was self-represented.

For further information, visit: http://rebusinessonline.com/wireless-watchdogs-buys-14566-sf-office-building-in-inglewood-for-headquarters/

 

Experts Predict 5 Mobility Trends for Your Company

Mobile1 From loT (the Internet of Things) to mobile payments – the world of enterprise mobility is progressively changing and potentially jeopardizing your security system’s safety. Are you up-to-date about the trends that will impact your company?

Mobile Device Software 

Your Mobile Device Management (MDM) software should be evaluated to ensure that you offer accessibility and usability without sacrificing integrity.  If you experience slower performance and issues associated with aging equipment or repairs, consider migrating to a system with integrated functions that work together in an environment that saves time and money.

Hackers Focus on Next Gen Mobile Payment Platforms

Hackers use card cloners  — retail PoS devices that have been modified – to retain your personal information. Then thieves conduct financial transactions via mobile devices. Security experts are now using chip-based technology used to combat theft.

Employee Access

In a press release by Gartner in May 2013, it predicted that “Half of employers will require employees to supply their own device for work purposes.” BYOD (Bring Your Own Device) gives employees the usage of tablets and phones in real-time. Does your company have a MDM solution capable of handling a host of mobile devices?

Application Development

With the mobile-first approach being a dominant trend, enterprises are creating their own apps. Almost half of businesses plan to prioritize the mobilization of general business apps by 2018. To create the best strategy, consider the features of the device(s) mobile users need to gain access and the tasks they’ll be doing.

Threat Management

Increased risk is inevitable with more devices and apps. Unified Threat Management is a comprehensive security solution comprised of gateway antivirus, data leak prevention, Virtual Private Network, etc. that uses maximum energy and cost-effective solutions versus point security solutions.

 

Staying ahead of the trends in enterprise mobility is challenging. But your mobile system must be equipped with the most current hardware, software or firmware to achieve optimization of efficiency and security.

 

Eliminate Risk on Your Company Mobile Phones

mobile security 2Hackers are targeting Android devices at an alarming rate because of the ease of accessing personal information on the device. With an increase in personal information being processed and stored on mobile devices, could you or your business afford to be attacked? The information that a hacker can access is even scarier than you thought!

The more that employees and contractors use mobile devices to access organizational systems, applications and data, the more important it is to protect unwarranted access. It’s vital to prevent your mobile devices form getting hacked. Mobile devices are meant to increase productivity and add to the bottom line, but unauthorized hackers can sometimes easily access information and other assets. This turns company mobile phones into a danger and a possible drain on revenue instead.

Given that mobile devices are essentially moving targets used outside the organization’s perimeter — as well, outside its firewalls, threat management, spam and content filtering, and other tools used to keep unauthorized hackers away— it’s vital to apply a series of best practices to use on mobile devices to keep exposure to risk and loss to a minimum.

Although it’s challenging and comes with some costs, the following list of mobile security best practices can help protect mobile devices and their users from unwanted exposure or unauthorized disclosure of company or organization IP, trade secrets or competitive advantages. All will help reduce risk of loss or harm to your company or organization.

  • Get Anti-Malicious Software for Your Mobile Device
  • Secure Your Mobile Communications with encryption and private networks
  • Use Password Controls and Strong Authentication
  • Control Third-party Software by requiring user to log into a remote virtual work environment
  • Perform Regular Mobile Security Audits

 

5G Networks are on the Horizon

5G networks are already on the horizon.
The “G” in 3G, 4G and 5G stands for “generation.” So 5G will be the fifth generation of wireless network technology.
Five years after the first 4G smartphone hit the market, the wireless industry is already preparing for 5G. Each of the four nationwide cell phone carriers, as well as smartphone chipmakers and the major network equipment companies are working on developing 5G network technology for their customers.
At this point, 5G networks are just being created, so it is not yet know what it will look like and exactly when it will get here. Currently, experiments are planned for the 2018 Winter Olympics in South Korea, with mass deployments beginning sometime in 2020.
What we do know is that 5G networks will be about 66 times faster than 4G. It will be faster, smarter and less power-hungry than 4G, enabling a myriad of new wireless devices. 5G will let us have faster smartphones, more smart-home devices and longer-lasting wearable gadgets.

Mobile’s Part in the Internet of Things

Economic growth depends on a connected world. The explosion of connected devices is projected to create as many as 34 billion connected devices and $1.2 trillion in economic activity by 2020. This will create growth opportunities in diverse sectors throughout the U.S. economy as mobile connectivity becomes more and more a part of everyday life.

Connectivity is being redefined through the so-called “Internet of Things” (IoT). The new, extended definition of connectivity refers to: 1) users connecting to smart devices to accomplish a task; 2) smart devices connecting with ordinary objects to deliver additional information, functionality, or value; and 3) smart software or smart devices connecting back with organizations to deliver insight on user behavior.

The Internet of Things (IoT), or Machine-to-Machine (M2M) technology, is technology that enables networked devices to exchange information and perform actions without the manual assistance of humans. It will further speed up mobile opportunity and transform how people and our economy interact with the many tools of modern life.

Mobile actually made IoT possible, and the beginning of big data tools made it desirable. The Internet of Things is not really about things, but about data. Companies will soon have to determine how to manage mobile in its new IoT roles.

It is important for companies to reevaluate their cellular and WiFi networks to accommodate more devices, most of which will be simply tasked sensors. Each set of connected products has a different IoT platform attached to it so it will never get as simple as managing traditional mobile devices. There will be more network traffic, as well as the need for increased security and protection strategies. There are three critical ways mobile plugs into IoT for which IT must prepare:
– Apps designed to control things
– Data collection
– Apps designed to deliver big data analytics to the mobile user

Businesses who haven’t yet explored or utilized IoT will need to start conversations and seek out how to best manage the connected devices. Companies will also need to scope out the competition and outline a strategy of how connected devices will pertain to their specific business.

Did you know that iOS can use 20-30% more data?

We saw this information reported this week by ITWire.

iOS 9 has Wi-Fi Assist, a feature that automatically connects devices to cellular networks when Wi-Fi signal is lost. While this automatic switch sounds convenient, it means the user may not be aware of the corresponding data costs incurred.

Within two weeks of iOS 9 being launched, 50 of its major enterprise customers reported that iOS 9 users were using 20-30% more data since the update from iOS 8. In several instances this appears to be caused by the automatic activation of Wi-Fi Assist in locations where corporate Wi-Fi was available but it was overloaded or patchy. This is concerning for businesses that may be incurring unnecessary mobile costs while their employees are at their desks.

To learn more about how you can monitor and manage your company’s cell phone usage, call John Gonzalez at Wireless Watchdogs, LLC at 310-943-3415.

California Employees Filing Class Action Lawsuits Against Their Employers

A California Appeals Court ruled in August 2015 that employers must reimburse employees for personal mobile phone call charges related to work.

The court ruled that reimbursement must be a “reasonable percentage” of the employee’s overall phone bill. “We hold that when employees must use their personal cell phones for work-related calls, Labor Code section 2802 requires the employer to reimburse them. Whether the employees have cell phone plans with unlimited minutes or limited minutes, the reimbursement owed is a reasonable percentage of their cell phone bills.”

Based on the above decision, employees in California are starting to file class action lawsuits against their employers for failing to reimburse them for work-related calls.

This may become a growing trend as more people become aware of the law and are not happy with their employer’s reimbursement (or non-reimbursement) of work-related wireless phone expenses.

The decision only affects California employers, so its national significance remains to be seen.

To learn more about how you as an employer can monitor and manage your employees’ cell phone usage, call John Gonzalez at Wireless Watchdogs, LLC at 310-943-3415.

Is Your Mobile Security At Risk? – I think so!

Earlier a very interesting story was aired on Today.com. The main focus was on Android user’s vulnerability. Hackers are targeting Android devices because of the ease of accessing personal information on the device.

With an increase in personal information being processed and stored on mobile devices, could you or your business afford to be attacked?

I urge you to take a look at the story in the link below.

More importantly, use this as a wake up call to the vulnerability of your organization should one of your employees be targeted! The information that a hacker can access is even scarier than you thought!

In the link below, take a look at some of Google’s tips to keep your device safe.

http://www.today.com/money/certain-apps-may-be-putting-your-android-device-risk-t22831

 

Have You Thought About Mobile Privacy?

Over this past weekend, I came across an article that really grabbed my attention. The article was called “The Secret Your Cellphone company Doesn’t Want you To Know” and was posted on www.foxnews.com . With privacy concerns being one of the biggest discussion points as we move further and further into the digital world and the Internet Of Continue reading

Why Proper Device Recycling and Disposal is a Growing Need

An article published last week by #techcrunch titled “Upgrades Fueling Second Hand Smartphone Sales Boom, Says Gartner” goes into detail on a study recently done by #Gartner_Inc on the second life of smartphones.

Why is this important? Well, a couple of the stats are quite scary if your enterprise is not prepared:

The global market for refurbished devices will more than double in 2017

Only 7 percent (YIKES!!) are sent to recycling organizations – Imagine where the others end up…

My focus is 2 fold…

The first… proper device disposal for devices with no future reuse case is important for our environment. The impact of mobile devices when not recycled correctly can be quite impactful on our world.

The second… how poor disposal processes can impact the enterprise. As mobile devices have become the center of how businesses communicate, (taking over the role in many cases of the PC?) the amount of intellectual property that lives on that device is at an all time high. Mobile Device Management is simply not enough. The enterprise needs strict policy around proper device wiping and disposal.

If your company has not taken the right steps to put in an official device recycling policy, I highly recommend looking to change that in 2015.

For more information on the article referenced above, click this link: http://techcrunch.com/2015/02/18/reuse-dont-recycle/