Asset 1EN.png

Cimpl Blog

Your Weekly Insights on How to Manage your Enterprise Digital Footprint.

How the Law Can Change the Way You Manage IT and Telecom Assets

Last year, the law really started taking note of cellphones and smartphones. We covered this in some detail then, but it’s worth returning to the topic every now and again. After all, we need to keep reminding ourselves of events that could impact the way we do business. Also, laws keep evolving.
Read More

16 Tips to Improve Your Passwords and Secure Your IT Assets

The top 5 WORST passwords IT security concerns are becoming a top priority for CIOs around the world. And well they should be. Between the rise of BYOD and the growing IT spend, there’s also a lot of confusion on how to secure BYOD and company-owned IT assets. It has to be done – more and more, IT helps you drive revenue. Letting it all run unchecked is a bad idea. Sadly, that’s happening often. As seen in a previous article, 27% of IT professionals said they don’t fully understand  the negative impact of mobile security issues. The majority of people do at least know that passwords are important, and that’s why one of the most common risk control measures is password protection (67%).
Read More

3 Ways the Love of Mobile Devices Will Change IT Best Practices

2015 is the year that Canadians really became mobile surfers Well, it looks like we’ve reached a really big tipping point in Canada! According to comScore, Canadians are now using mobile devices (i.e., mobile phones and tablets) more often than their computers to surf the web! Granted, the advantage is slight at the moment – the ratio of mobile surfers to desktop surfers is only 51% to 49%. That said, context is key.
Read More

Software Audits: Why You NEED to Care and How to Prepare

on July 25, 2014 8:00 AM By | Henry Cheang | 0 Comments | BYOD Policy Compliance Audit IT cost management Software
…And the answer is, you’re probably not… Ah, software audits. They’re a source of anxiety for organizations, but are, unfortunately, a wholly necessary activity for software creators. Software producers lose at least 10% of their revenue from pirated or unlicensed software use by end users. In concrete numbers, this amounts to $34-64 billion in losses per year for software producers as a whole.  
Read More

3 Selling Points To Support IT Assets Management

on January 7, 2014 10:33 AM By | Caroline Le Brun | 0 Comments | Telecom Expense Management BYOD Policy Compliance IT Assets tem
Need to Convince Your CFO?  We are all concerned by the recession and how it affects the way we manage our businesses. We need to reduce expenses as much as possible. Therefore, it’s unsurprising that CFOs make cuts in department budgets to overcome losses or simple lack of profit. While budget trimming improves the bottom line, it's a bad reason to set aside investments in IT asset management software. Unfortunate, but it's done regardless. So, the challenge for a CIO is to show the economic benefits that such solutions can bring to a company. To convince your Financial Manager to purchase or at least consider an IT assets management software, here are three selling points to rid him or her of any doubt. 
Read More

How To Protect Your Data In A Mobile Environment

And how to master compliance Mobile technologies are challenging data security for the Chief Information Officers (CIOs). Compliance is more difficult to implement in an environment where many threats emerge from several fronts.
Read More

Wireless Policy Lifecycle

on August 13, 2012 10:46 AM By | Caroline Le Brun | 0 Comments | BYOD Policy Compliance Mobile Devices Tips Policy
The importance of having a wireless device policy Using a wireless device at work can decrease productivity or lead to employee injuries as a result of things like distraction, as such more companies are recognizing the importance of developing and implementing a wireless device policy.
Read More

Follow Us!

Bring Your
Self-Assessement_Checklist
Con

Subscribe to our Blog