mac
Reverse Social Engineering Tech Support Scammers
This post is authored by Jaime Filson and Dave Liebenberg. Background The amount of fraudulent actors masquerading as legitimate tech support has been on the rise since 2008. According to David Finn, executive director at the Microsoft Cybercrime Center, tech support scammers have made nearly $1.5 b…
Get Your WLAN Ready for Google Android L and Apple iOS 8
This fall your wireless networks will experience many devices upgrading to the new Android 5.0(L-release) and Apple iOS 8 releases (cue: IT managers groan). There have now been many blogs attempting to capture the enhancements expected with these releases. Today I am going to focus on describing how…
Apple iOS 8 and MAC Randomization: What It means for Cisco’s Connected Mobile Experiences (CMX) Solution
As you may have read, Apple’s iOS 8 will come with some changes to the way MAC addresses are exposed in Wi-Fi probe requests. Apple’s intent was to provide an additional layer of privacy for consumers and target those companies that offer analytics without providing any value to the end consum…
How Does Enterprise IT Respond to Consumerization? To Mac, BYOD, and Whatever Comes Next?
There’s a new force changing the way Cisco IT operates, the way we plan and develop new services, and the way we support our employees. Consumerization is showing us how to help our employees to be more productive and more satisfied – if we can learn to listen and respond.…
IT Mobility Social Support Leads to Reduced Costs
Cisco IT’s Bring Your Own Device (BYOD) program allows employees to be most productive on whatever device they choose. Whether it’s an iPhone, iPad, Android, Mac or PC they can connect to the Cisco internal network easily, but that’s not what this blog is about, if you’re interested in that initiat…