Smartphones, tablets and other mobile computing devices are becoming our go-to devices when it comes to getting things done, especially outside of the traditional office setting. They're just too convenient, and the increasing power packed into these gadgets means that some of them are worthy (or nearly worthy) of supplanting the laptops and desktops they once supplemented.
However, the smaller form factor of these devices, the "nomadic" nature in which they are used and the proliferation of different strategies (or inadequate ones) for securing these devices means that they create their own kinds of risks to your business data.
Given the risks, it’s important to adhere to strong security practices, especially if your device is personally managed and not administered by your company’s IT department. This slideshow features recommendations from The Information Assurance Mission at the NSA for securing your personally managed iPhone or iPad.
These facts aren't for the faint of heart, so leave a light on while you learn about the dangers faced by data in the wild. ... More >>
A new report aggregates and standardizes cyber crime data from the first six months of the year into cyber BI that provides some interesting insights. ... More >>
With increased popularity comes more attention from malicious hackers trying to access PII and other sensitive data. It's more critical than ever before to understand how -- and where -- you're storing your data, and the variety of vulnerabilities that can exist in the apps in your network. ... More >>