VoicePlus Blogs

underline-img
Who is responsible for employee behaviour on a corporate mobile device?

Who is responsible for employee behaviour on a corporate mobile device?

Many Australian enterprises have no corporate mobile policy, but do you need one? Who is responsible for employee behaviour on a corporate device?

Read More arrow-img
Electronic security and cybersecurity go hand in hand says Telstra

Electronic security and cybersecurity go hand in hand says Telstra

Telstra's director of global security solutions, Neil Campbell, believes that electronic and cyber security will overcome the challenges to convergence.

Read More arrow-img
3 reasons why you should strengthen your mobile phone passcode today

3 reasons why you should strengthen your mobile phone passcode today

The biggest security weakness in any system is the humans using it.

Read More arrow-img
C-suite mobile devices are biggest risk to enterprise security

C-suite mobile devices are biggest risk to enterprise security

C-suite executives' believe their own smartphones are the biggest security risk to the business, according to a new survey from wi-fi hotspot provider, iPASS.

Read More arrow-img
Australian small businesses are most vulnerable to ransomware attacks

Australian small businesses are most vulnerable to ransomware attacks

Australian small businesses are most at risk of ransomware attacks because they sit at the juncture of money and vulnerability.

Read More arrow-img
Why do Australian companies need a mobile phone policy?

Why do Australian companies need a mobile phone policy?

When there is no corporate mobile phone policy, don’t complain if employee behavior costs the business - both in reputation and the bottom-line!

Read More arrow-img
'Tis the season for holiday phishing ...TOP 11 SCAMS TO WATCH OUT FOR

'Tis the season for holiday phishing ...TOP 11 SCAMS TO WATCH OUT FOR

There's something about the 'joy and goodwill' of the holiday season that makes us more susceptible to getting scammed! Here's a timely reminder of the top 11 phishing scams to watch out for this Christmas.

Read More arrow-img
Facebook photos could be added to Australia's facial verification database

Facebook photos could be added to Australia's facial verification database

Earlier this month the Government quietly announced that the first stage of its facial verification system had gone live. What does this mean for the average Australian - today and into the future?

Read More arrow-img
More than one-third of Australian companies have experienced an outage

More than one-third of Australian companies have experienced an outage

Will 2016 go down as the "Year of the IT outage" ? Telstra, the Australian Bureau of Statistics Census, National Australia Bank and the entire South Australian electricity grid...the list goes on, but those big players are not alone in their pain. More than a third of Australian organisations have experienced an IT outage, according to a new report.

Read More arrow-img
MAM is a growing requirement for enterprise business

MAM is a growing requirement for enterprise business

By the end of 2017 demand for mobile apps will grow at least five times faster than internal IT has capacity to deliver them, predicts Gartner. The need to manage these apps is driving interest in Mobile App Management (MAM) tools.

Read More arrow-img

3 Strategies to Reduce Telecom Cost