Mobile ROI, Ex-Employee Hacks Top September Enterprise Mobility News

Breaches, hacks, and strategic personnel moves across the enterprise mobility horizon made themselves apparent in the month of September, and canvassed the headlines here at Enterprise Mobility Exchange. This month we learned ex-employees are by and large still able to access their former company's data; some public sector IT teams are proving analysts wrong by becoming leaders in mobile transformation; and the ever-growing atmosphere of IoT needs a holistic view when it comes to security. Here's a look at Enterprise Mobility Exchange's top stories of September. Click on the headline for more information.

Movers & Shakers: MobileIron Strategist Goes To Google; Ill. CIO Off To Amazon
Top-level executives and technology strategists made waves in the past month, moving within their own industry as well as exiting the public sector to work in the private space. See who’s moving where, and why it matters.

‘Going Mobile’ in Illinois Creates 400% Time ROI
Mobile transformation in the public sector tends to lag, but for the State of Illinois, it’s become a priority. See how the technology team in the state’s capitol has pushed mobility forward and created immense time ROI for its employees.

Hacks Are Happening Because Ex-Employees Still Have Access
One in every five enterprises said failure to deprovision employees from corporate applications contributed to a data breach, while half of ex-employee’s accounts remained active for at least 24 hours after separating from the company.

Connecting Business With Mobile Creates ‘First-Class’ Delivery
Divyang Bhatt, Head of the Mobile Center of Excellence at QuintilesIMS, will be a featured panelist at the upcoming Enterprise Mobility Transformation Exchange in San Diego this November. In this Q&A, see what Bhatt will focus on and how it impacts his enterprise. 

IoT Ecosystems, Not Just Devices, Need Security
What’s slowing the Internet of Things growth? Many enterprises are focusing on how to secure all the endpoints within IoT, but those vectors include sub-endpoints, which leads to the need for all involved to look at holistically securing the entire ecosystem.