Asset 1EN.png

Cimpl Blog

Your Weekly Insights on How to Manage your Enterprise Digital Footprint.

4 Important Things to Know About the Current State of IT

on October 27, 2015 5:00 PM By | Caroline Le Brun | 0 Comments | Cost Allocation Security IT Budget Tips Passwords Managed Services
Spiceworks just released the 2016 edition of its annual State of IT Survey. This is a pretty big survey that polled information from IT professionals from every industry across the planet in 2015. That’s a lot of data to be putting into a single survey, and that’s why the results are worth your time to take in.
Read More

5 Questions IT Managers Need to Ask About Enterprise Mobility

on October 7, 2015 5:45 PM By | Henry Cheang | 0 Comments | Security Mobile Devices IT Assets Tips Best Practices Provider Cloud MDM
The results of the 2015 IDG Enterprise Building the Mobile Enterprise Survey came out not long ago. The topic of this year’s study revolved around the top mobile priorities in business as well as the influence of emerging mobile tech on enterprise. This should come as no surprise: The majority of enterprises polled put mobile and mobile security as their highest priorities and concerns. What else came out of this study?
Read More

Why the Government Thinks BYOD is Bad for Business

on August 14, 2015 12:00 PM By | Henry Cheang | 0 Comments | BYOD Security
On August 13th, three Privacy Commissioners (of Canada, British Columbia, and Alberta) issued guidelines informing businesses of the risks in implementing bring-your-own-device (BYOD) programs, and with good reason.
Read More

Can Software Manage the Big Data of IoT and M2M?

on July 31, 2015 6:30 AM By | Henry Cheang | 0 Comments | Big Data Security New Releases ebook Software IoT HTML5 M2M
Have you recently heard the terms Machine-to-Machine (M2M) and the Internet of Things (IoT)? You probably have; these are big buzzwords that already have a huge impact on people and especially on business.
Read More

5 Important Things You Need to Know About SaaS

on April 29, 2015 7:00 AM By | Henry Cheang | 0 Comments | Security SaaS Tips Productivity Cloud ROI
In recent years, big technology companies have been making big pushes to increase cloud adoption and create more software-as-a-service (SaaS) offerings. Microsoft and HP have been among the biggest names to champion this type of business technology, and it looks like they chose wisely.
Read More

Freak Bug: No Security Risk for Cimpl’s Platforms

on March 5, 2015 7:00 AM By | Henry Cheang | 0 Comments | BYOD Security Mobile Devices
*Please note Etelesolv changed its company name to Cimpl in 2016. The Freak Bug made international news today. Before getting into specifics, we want to announce something important to our loyal customers: CIMPL HAS NEVER BEEN VULNERABLE TO THE FREAK BUG: OUR APPLICATION, SERVERS, AND WEBSITE REMAIN SAFE FROM THE BUG. Vincent Parisien, Cimpl’s Vice-President of Technology, was very clear about Etelesolv’s security-readiness in the face of the Freak Bug: “I would like to reassure our customers that Cimpl’s systems and platforms have never been at risk from the Freak Bug vulnerability. We’d already disabled the protocol SSL 3.0 as recommended by industry experts, thereby ensuring our complete security from such risk. We know that it’s a privilege to have our customers entrust their data to us. That’s why security is a primary concern at Cimpl. Thanks to our precautions, our customers' data remain safe in our systems.” Now that we’re clear, let’s get into details! 1) What is the Freak Bug exactly?
Read More

For Companies to Win, the CIO Must Partner with other Chief Executives

on March 4, 2015 7:00 AM By | Henry Cheang | 0 Comments | Big Data BYOD Security IT Assets IT Expense Management IT Budget
Evolving business IT usage  means constant changes in how departments interact with each other. As seen previously, Chief Information Officers (CIOs ) are adopting (or at least exploring) BYOD, cloud computing and Big Data (among other trends) to meet business needs.   However, when thinking about technology, we have the misconception that the CIO is the only person responsible for managing it all. That used to be true, but not anymore... The times are changing According to a recent Gartner survey, CIOs are finding that they have to improve communication with other leaders in their organizations because IT itself is becoming increasingly necessary to business strategies. In the survey, the top 3 reasons for CIOs to seek stronger relationships with other business units were: To gain a clearer understanding of business strategies and priorities (21%); To identify initiatives and projects to focus on (19%); To build more collaborative relationships with business executives (17%);
Read More

Top Priorities for the 2015 IT Budget

on February 25, 2015 7:00 AM By | Henry Cheang | 0 Comments | BYOD Security Mobile Devices IT Budget Cloud Software Trends Hardware Managed Services
As a CIO (or anyone else who has to manage technology for companies), you’re going to have to keep track of business IT trends all the time. We at Cimpl love to help you make your job easier, and that’s why we’re bringing you a summary and some analysis of  Spiceworks’  latest IT budget report for 2015.   Spiceworks’ study was created by gathering the  opinions of over 600 IT leaders across the world, representing diverse industries such as manufacturing (15%), Education (12%), and Health Care (9%) among many others. The report touches on many important areas.Read on to see what the numbers say! 
Read More

How the Law Can Change the Way You Manage IT and Telecom Assets

Last year, the law really started taking note of cellphones and smartphones. We covered this in some detail then, but it’s worth returning to the topic every now and again. After all, we need to keep reminding ourselves of events that could impact the way we do business. Also, laws keep evolving.
Read More

16 Tips to Improve Your Passwords and Secure Your IT Assets

The top 5 WORST passwords IT security concerns are becoming a top priority for CIOs around the world. And well they should be. Between the rise of BYOD and the growing IT spend, there’s also a lot of confusion on how to secure BYOD and company-owned IT assets. It has to be done – more and more, IT helps you drive revenue. Letting it all run unchecked is a bad idea. Sadly, that’s happening often. As seen in a previous article, 27% of IT professionals said they don’t fully understand  the negative impact of mobile security issues. The majority of people do at least know that passwords are important, and that’s why one of the most common risk control measures is password protection (67%).
Read More

Proposed Bill May Redefine Workplace Transparency for Mobile Phones

on January 28, 2015 7:00 AM By | Henry Cheang | 0 Comments | Security Mobile Devices Work Smarter Workplace Smartphones
An MP wants warning labels for mobile phones Well, here’s something you might have missed! On January 19, Conservative MP Terence Young (of Oakville, Ontario) announced a bill (Private Member’s Bill C-648, to be precise) that will require big,  hard-to-miss warnings about the potential dangers of mobile phones (and wireless devices) to be displayed on the packaging and displays of cell phones and wireless routers.
Read More

Another Kind of Mobile Security: 3 Steps to Reduce Distracted Driving

on December 24, 2014 7:00 AM By | Henry Cheang | 0 Comments | Events Security Mobile Devices Statistics
It’s the holidays, and it’s time for some fun! I’m headed to two family dinners in two different remote towns (can’t wait for the turkey and meat pies), and I’m not going to be the only one going away for the holidays. Many of us will be on the road. Which is why we need to have a word on safe driving!
Read More

Follow Us!

Bring Your Own
Self-Assessement_Checklist
Con

Subscribe to our Blog