What Flappy Birds Can Teach You about Mobile Device Security
As part of our ongoing examination of new cyber threats, this blog has focused on mobile device vulnerability. We’ve highlighted growing mobile threats in "The Mobile Future & Why You'll Need...
View ArticleEnd of XP Support from Microsoft Could Affect Retailers
According to a report by NetworkWorld, most point-of-sale systems rely on a scaled-down version of Windows XP, which means retailers could be in trouble when Microsoft stops supporting the OS this...
View ArticleProposed Bill Would Mandate Smartphone Kill Switches to Fight Data Breaches
Four senators have proposed a bill that would require smartphone makers to include a "kill switch" to allow consumers to shut off phones and lock them after they're stolen. According to CNET, The...
View ArticleHow to Talk Apps to Clients
Business News Daily raises an important point for mobile app developers: your clients may want a "mobile presence,” but have no idea what that means.Indeed, all IT professionals face this fundamental...
View ArticleIs It Time to Go Looking for Data Breaches?
Stop me if you've heard this one: a major U.S. retailer was hit with a massive data breach. It sounds familiar because it is. But this time, we're not talking about Target. We're actually talking about...
View ArticleMake Your Clients Safer: A Lesson in Email
According to a PressTV report, a recent study by HALOCK Security Labs revealed that email security problems are surprisingly common in the financial industry. More than 70 percent of mortgage lenders...
View ArticleTech Firms Announce They’re Doing Risky Business
The Wall Street Journal's MarketWatch reported this month on an incredible discrepancy between tech firms and other industries. Tech vendors and IT companies see their work as risky and susceptible to...
View ArticleClients Care about Cyber Security All of a Sudden? Hooray! Here’s How to...
Since the major data breach at Target, everyone and their mother has been talking about data breaches, which means your clients will probably have more questions about their own cyber security. They'll...
View ArticleRecommendations for IT Professionals Consulting on iOS Security
In the early 2000s, Apple was charming consumers with iPods and iMacs, but most of the business world still relied on Microsoft’s Windows operating system and favored non-Apple devices. When smart...
View ArticleWhat the Target CIO’s Resignation Reveals about Business Psychology
The Huffington Post reports that Target Corporation's Chief Information Officer, Beth Jacob, has resigned from her position as the company looks to regroup after the largest data breach in U.S....
View ArticleThe Million-Dollar Client Conversation
Wouldn't it be great if there were a simple way to reduce the likelihood and cost of a data breach? Well, there is. Simply having a conversation can fix many of the misconceptions employees and clients...
View ArticleThe Next Generation of Business Data Breach: IP Theft
What is IP theft? It's the stealing of intellectual property, designs, patents, code, and other intangible assets. IT theft is becoming more and more common and costly – and even small IT firms can end...
View ArticleStudy: Only 9% of Companies Feel Safe from Insider Data Threats
When talking about data security, it's easy to think only of outside threats (such as hackers and malware) and forget that many of the biggest dangers to data come from within an organization. Insider...
View ArticleWhat Flappy Birds Can Teach You about Mobile Device Security
As part of our ongoing examination of new cyber threats, this blog has focused on mobile device vulnerability. We’ve highlighted growing mobile threats in "The Mobile Future & Why You'll Need...
View ArticleEnd of XP Support from Microsoft Could Affect Retailers
According to a report by NetworkWorld, most point-of-sale systems rely on a scaled-down version of Windows XP, which means retailers could be in trouble when Microsoft stops supporting the OS this...
View ArticleThe Next Generation of Business Data Breach: IP Theft
What is IP theft? It's the stealing of intellectual property, designs, patents, code, and other intangible assets. IT theft is becoming more and more common and costly – and even small IT firms can end...
View ArticleStudy: Only 9% of Companies Feel Safe from Insider Data Threats
When talking about data security, it's easy to think only of outside threats (such as hackers and malware) and forget that many of the biggest dangers to data come from within an organization. Insider...
View ArticleWhat Flappy Birds Can Teach You about Mobile Device Security
As part of our ongoing examination of new cyber threats, this blog has focused on mobile device vulnerability. We’ve highlighted growing mobile threats in "The Mobile Future & Why You'll Need...
View ArticleEnd of XP Support from Microsoft Could Affect Retailers
According to a report by NetworkWorld, most point-of-sale systems rely on a scaled-down version of Windows XP, which means retailers could be in trouble when Microsoft stops supporting the OS this...
View ArticleThe Next Generation of Business Data Breach: IP Theft
What is IP theft? It's the stealing of intellectual property, designs, patents, code, and other intangible assets. IT theft is becoming more and more common and costly – and even small IT firms can end...
View Article