How-Tos

windows 7 logo in the rear view mirror
resume template job application recruit stack of paper by yurily altukhov getty

security policy primary

How to create an effective security policy (and 4 templates to get you started)

Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response.

tools or toolkit surrounding a lightbulb on a chalkboard to build, develop or repair

How to build a startup evaluation toolkit

In the first installment of our startup evaluation guide, we cover five essential tools you need to ensure you are heading in the right direction.

ios13 hero 03

How to create a mobile policy for iOS devices

When developing a mobile policy for iPhones and iPads, it’s important to keep in mind that from an EMM perspective, Apple’s biggest goal ( beyond privacy) is delivering a single seamless iOS experience.

cloud

Your guide to using iCloud in business

A growing number of companies are using iCloud -- Apple’s storage and syncing suite for Mac and iOS. Here's how to take advantage of iCloud’s ease of use and tight security.

google android pixel 3 smart phone purple

How to create a mobile policy for Android devices

Android has become a viable enterprise platform and in some ways is beating Apple in terms of enterprise functionality. This means that IT departments supporting Android devices need to create and implement effective policies.

CIO | Middle East  >  Mobile computing / smartphone / remote worker / digital nomad / BYOD

How to develop a mobile policy

Why you need to sweat the details and avoid a far-reaching (too broad) policy when it comes to managing mobile devices.

man skating on longboard binary speed responsive agile executive with briefcasse

How to achieve business agility via the cloud

Hear from IT leaders who have followed the cloud and have some wisdom to impart.

Load More