Chances are, you’ve heard of phishing before–emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing...
You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners....
Many websites and services now have apps that they use to further distribute their solutions via smartphone. However, when it comes to your business’s sensitive information, which is more secure: the mobile app, or the web-based client? Researchers from Northeastern...
It’s common today for people to use their own devices for work purposes. Bring Your Own Device (BYOD), is now accepted practice, but it needs to be implemented properly to reap the advantages and avoid the pitfalls. Employees need to know what your...
The introduction of new and exciting technologies keeps changing the ways people interact. Innovations such as email, instant messaging, and the development of mobile devices are now turning out to be just fundamental steps to a more connected planet. The Internet of...