Great news for businesses: Apple has listened to the feedback and granted companies greater flexibility in controlling Apple IDs on their domains. Starting in 2023 many companies found that Apple had blocked their domain from making consumer level Apple IDs, forcing...
In our MDM practice at LINQ, we sometimes will meet with a client for the first time and come to realize their environment has been configured in such a way that requires a lot of manual attention, sometimes by default. Certain MDM’s resources will even walk an...
With the US Government banning TikTok in 2023, many organizations are considering or even contractually obligated to restrict access. For some companies, content filtering on mobile may be a new challenge, in some cases requiring new technologies not yet implemented....
Today, mobile devices are transforming healthcare delivery by increasing efficiency, streamlining workflows, and improving patient outcomes. But when healthcare organizations allow employees to use their own mobile devices for work-related tasks, they may be...
If your company encourages employees to “bring your own device” (BYOD) then that means employees will be using their personal devices to connect to your business’ network, assessing work-related systems and sensitive corporate data on their personal...
Before the internet and mobile devices were essential workplace tools, disaster recovery plans were established to mitigate the effects of physical catastrophes like fires, floods, and severe storms. But in today’s connected environment, digital disasters — such...
“Mobile Phones can’t get hacked” – an unfortunate myth that has led some not to take mobile security seriously. The threats that face mobile are more diverse than the ones that apply to PCs. As these dangers can be entirely different, it’s important to account for...
Acronyms, acronyms! The Mobile Device Management (MDM) world is filled with them. In a previous article, we introduced Zero Touch Enrollment Programs (ZTEPs) to achieve supervision. However, there are several different ZTEPs, and therefore several acronyms that you...
What is it? Activation lock is a feature designed to secure and protect your personal data if your device becomes lost or stolen. When you start the initial setup of a device, it will contact the manufacturer’s activation server to verify the device is eligible for...