Posted on April 29, 2014 by David Jevans in Blog
The Beginners Guide to Bring Your Own Device (BYOD)
Imagine this scenario. John, an employee of your business, is having a typical morning at work. It's 9:15 a.m., as he's checking his morning emails. Oddly, he gets a notice from the HR department as...
Posted on April 9, 2014 by David Jevans in Blog
The Best Information Security Resources on Google Plus
Lately, we've been unraveling the top security resources to follow — including the best security experts on Twitter and the best security blogs to read — as it's helpful to discover experts on mul...
Posted on March 24, 2014 by David Jevans in Blog
12 Must-Have iPhone Security Apps to Protect Your Data
For the first time in history, people spent more time on their mobile phones than on desktop computers in 2013. As a result, the necessity for phone security is increasingly important. A compromised d...
Posted on January 22, 2014 by David Jevans in Blog, security
10 Security Blogs You Should Be Reading
With security the top IT concern for companies, it's critical that professionals stay current with breaking security news. Any business that leverages technology should understand what it can do to pr...
Posted on January 14, 2014 by David Jevans in Blog, security
The Biggest Security Breaches of 2013
In 2013, millions of accounts were compromised. Customers suffered and businesses lost millions of dollars due to the massive security breaches that took place. However, these security breaches are on...
Posted on November 20, 2013 by David Jevans in Blog, security
100 Security Experts to Follow on Twitter
As the worldwide security technology market is forecasted to grow 28% by 2016, according to Gartner, companies are continuing to strengthen their security technologies. With security being the pri...