4 Tips for an Effective BYOD PolicyIf you've decided to implement a BYOD (“bring your own device”) policy for employees, here are 4 things to consider.Apr 16, 2015Apr 16, 2015
Think Two-Factor Authentication Isn't for You? Think Again.Two-factor authentication operates under a basic premise: To access your account, you need to supply two factors to prove your identity.Apr 16, 20151Apr 16, 20151
STOP! 3 Things to Know Before You Allow BYODThe rise of “bring your own device” policies (BYOD) in businesses today mirrors the risk of mobile technology, and has massive risks.Apr 16, 2015Apr 16, 2015
Tax Time for Accounting Firms = Hacker HeavenIn January, the IRS issued a warning to taxpayers on tax-related identity theft. The problem is very real. In 2013 alone, the IRS paid an…Mar 20, 2015Mar 20, 2015
The Apple Watch and Mobile Security: 3 Things to Know About Staying Safe in the IoT AgeWhen Tim Cook showcased the new Apple Watch last week not much was said about the device’s security features. MarketWatch reported that…Mar 13, 2015Mar 13, 2015
3 Mobile Cybersecurity Predictions for 2015If we walked away from this year’s Mobile World Conference with one overriding thought it is this: the cybersecurity threats of tomorrow…Mar 10, 2015Mar 10, 2015