Skip to content
Microsoft Secure

Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past

Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work files and data to prevent accidental data leakage. With 600 million active Windows 10 devices, corporate customers...

Read more

The Importance of Smartphone Security

It’s no surprise that mobile phone usage has exploded over the past decade.  According to a study by ITU, there are roughly 6.8 billion mobile cellular subscriptions worldwide today.  As technology becomes more and more woven into the fabric of society, smartphone usage has become an increasingly common extension for desktop computing devices.  Employees are...

Read more

Don’t Let BYOD Backfire on Your Business

BYOD policies could easily backfire on businesses, unless closely monitored to maintain benefits for employees and the company.  I recently wrote a 3-part series on the Microsoft Security Blog called Motivations, Risks and Rewards of the BYOD Trend that examined what the BYOD trend is and then looked at it from the perspective of employees...

Read more

BYOD: Organizations Question Risk vs Benefit

Over the past few posts we’ve been covering the concept of the BYOD trend. We started with a foundation describing the origins and evolution of BYOD, followed by a closer examination of the pros and cons of BYOD from the employee perspective. This post will focus on BYOD from the point of view of the...

Read more

BYOD–is it Good, Bad or Ugly from the User Viewpoint?

Bring your own device–or BYOD–is a tech trend that is changing the way many organizations manage technology. In previous posts, we’ve shared some background on our Trust in Computing Research project, and some of the interesting data we’ve uncovered related to the consumerization of IT, and the BYOD trend. In this post we’re going to...

Read more

Beginner’s Guide to BYOD (Bring Your Own Device)

The era of IT departments mandating specific hardware, operating systems, or technologies is quickly eroding.  In its place a new culture is growing where employees are granted more autonomy—and given more responsibility—for their own technology. If you’ve been to enough parties you’re probably familiar with the term BYOB—a common acronym of the phrase “bring your...

Read more