What are the risks of BYOD?

The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases efficiency and convenience to your business, but it also brings a number of security risks to your IT infrastructure and data. If you’re thinking of incorporating BYOD in your office,

By |2020-02-24T18:04:15+00:00November 7th, 2019|Security|

3 Types of hackers you should know about

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who presents their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important. A complicated history In the

By |2019-11-13T15:21:04+00:00November 28th, 2018|Security|

What are the risks of BYOD?

The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases efficiency and convenience to your business, but it also brings a number of security risks to your IT infrastructure and data. If you’re thinking of incorporating BYOD in your office,

By |2022-01-06T08:42:21+00:00August 23rd, 2018|Security|

Black and white: Not all hackers are bad

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who takes their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important. A complicated history Since all

By |2019-11-14T10:58:16+00:00August 16th, 2017|Security|

2016’s possible security problems

As shown by recent high-profile hacking scandals - targeting everyone from Sony Entertainment to the extramarital-affair-facilitating website Ashley Madison - cyber crime shows no sign of disappearing any time soon. In fact, experts predict that 2016 is going to be an even busier year for cyber criminals, hackers and scammers. So what do you need

By |2019-11-07T07:31:31+00:00December 24th, 2015|Security|