Posted on April 29, 2014 by David Jevans in BlogThe Beginners Guide to Bring Your Own Device (BYOD)
Imagine this scenario. John, an employee of your business, is having a typical morning at work. It's 9:15 a.m., as he's checking his morning emails. Oddly, he gets a notice from the HR department as... Posted on April 9, 2014 by David Jevans in BlogThe Best Information Security Resources on Google Plus
Lately, we've been unraveling the top security resources to follow — including the best security experts on Twitter and the best security blogs to read — as it's helpful to discover experts on mul... Posted on March 24, 2014 by David Jevans in Blog12 Must-Have iPhone Security Apps to Protect Your Data
For the first time in history, people spent more time on their mobile phones than on desktop computers in 2013. As a result, the necessity for phone security is increasingly important. A compromised d... Posted on January 22, 2014 by David Jevans in Blog, security10 Security Blogs You Should Be Reading
With security the top IT concern for companies, it's critical that professionals stay current with breaking security news. Any business that leverages technology should understand what it can do to pr... Posted on January 14, 2014 by David Jevans in Blog, securityThe Biggest Security Breaches of 2013
In 2013, millions of accounts were compromised. Customers suffered and businesses lost millions of dollars due to the massive security breaches that took place. However, these security breaches are on... Posted on November 20, 2013 by David Jevans in Blog, security100 Security Experts to Follow on Twitter
As the worldwide security technology market is forecasted to grow 28% by 2016, according to Gartner, companies are continuing to strengthen their security technologies. With security being the pri... Posted on October 21, 2013 by David Jevans in Blog, securityOne in Four Young Adults Experience Hacked Accounts
New research by Marble Security indicates that more than 1 in 4 U.S. young adults born between 1980-2000 have had online accounts hacked. The national average — regardless of age — is closer to 1 ... Posted on August 27, 2013 by David Jevans in Blog, securityFBI and Homeland Security Warn of Android Security Risks
The US Department of Homeland Security has circulated a report to government agencies, including fire departments, ambulance services and police, warning of the risks of Android mobile devices.
The... Posted on August 5, 2013 by David Jevans in Blog, eCrime, securityAPWG Releases Latest 2013 Phishing and Malware Report
The Anti-Phishing working group has released their latest 2013 phishing and malware report. Click here to download the full report from www.apgw.org.
Broad-based phishing attacks declined in nu... Posted on August 5, 2013 by David Jevans in Blog, security“Good” Trojan Horse???
Dove, a maker of soap, released a Trojan into the art world. This Trojan horse malware tampers with Photoshop files, and attempts to educate artists that modifying body images for advertising is "wr... 123…5Next »