IoT Security Risks: 4 Types of Cyber Attacks to be Aware Of

The Internet of Things (IoT) has exploded, with more embedded devices being adding every month. From fitness bands and smart appliances to remote patient monitoring devices and industrial equipment, the technology has not just captured the fascination of consumers and businesses, but hackers as well. IoT presents a new set of security risks that both …

IoT Security Risks: 4 Types of Cyber Attacks to be Aware Of Read More »

Is Android ready for the enterprise?

The whole transition to Bring Your Own Device (BYOD) that stemmed from the consumer’s passion for their smartphones and later migrated to tablets created a major challenge to the enterprise IT community. How do you allow workers to use consumer devices in a business environment while also protecting the security of the network and its …

Is Android ready for the enterprise? Read More »

Malware on your Mobile Device: 5 Tips to Protect Yourself

Twenty years ago, many people did not have regular access to a computer and very few owned a mobile device, such as the first smartphone that was invented by IBM in 1992. A decade later, in 2002, the BlackBerry debuted and hit the ground running. Today, it seems that desktop computers are on the way …

Malware on your Mobile Device: 5 Tips to Protect Yourself Read More »

Chat