These days, employees’ phones contain your company’s sensitive data. Sure, IT can wipe the data off of the phone remotely, but ONLY when the employee notifies someone that they lost their phone. What happens is the users do not notify IT, and the lost phone still...
A common question is: “Does turning off a computer when not in use help with security?” Turning off a computer inconveniences attackers, but does not stop them. It is important to remember that attacks can happen in terms of fractions of a second rather than hours....
iCloud, SkyDrive, DropBox, etc. – Are they secure? How do you know how much to trust “the cloud?” Here are the answers… In most cases, when any service gets breached, they step up their security. One of the biggest reasons that services provide tight security is...
One of our best clients told me about what would have otherwise been a mundane event: Replacement of floor tiles by their local “Tile Guy”. However, this turned out to be pretty exciting. Let me share with you this (slightly dramatized) story: It was a dark and stormy...