Cybersecurity should be a top priority for every business, but we also know that IT budgets often lead to compromises. The problem is hackers constantly look for any vulnerability. We’ve all seen businesses ruined from a cybersecurity attack that could have been prevented. Cybersecurity Statistics Some experts believe the cost of cybercrime attacks will cost… Read more »
Posts Categorized: Security
Traditionally the kinds of virus and malware we see on client computers is fairly benign. While it may disrupt the flow of business, it is generally not destructive. It may require a computer to be formatted and reinstalled, but as a rule of thumb, the irreplaceable data is left in tact. It can be quarantined… Read more »
A lot of talk these days surrounds Mobile Device Management, why you need it and how you can use it to help control your mobile workforce. But did you know that if you work with a recent version of Exchange server, you have some portion of the control for mobile devices that sync to your… Read more »
Part of keeping your device secure is making sure that if it is lost or stolen, other people cannot access your data. Both IOS and Android have built-in device encryption which renders the data on the device useless if the password is unknown. To encrypt an iPhone or iPad (3GS or later): Touch Settings, this… Read more »
Last week, a group of hackers were all over the web for taking Forbes staff reporter, Andy Greenberg, on a joy ride in a Ford Escape and Toyota Prius (check out the video below). The purpose of this joy ride: To highlight the security vulnerabilities found in many of the most common cars. And the more that are connected, the more this will become a critical issue. An issue that has been mostly ignored by the auto industry.
As we continue on our discussions around BYOD, one topic that comes up time and again is the potential issues around these mixed use devices. The mixing of personal and professional data creates some questions and issues that really do bear some analysis and discussion before making any final decisions regarding BYOD in your business.
BYOD. Bring your own disaster? Bring your own disruption? The fact is, when it comes to bring your own device, resistance is futile, and most of the concerns we hear about can be remediated with a little planning. In reality, BYOD is not a technology challenge so much as it is a business question, and I think that fact is overlooked far too often due to the overwhelming noise in the space regarding security fears, viruses, CONTROL, etc.
There are a lot of good reasons to upgrade to Windows 7, but today I am just here to talk about security! I recently had