Latest Articles

Mobile Device BYOD Security

So, what are the security considerations an organization should implement or consider with a bring your own device policy? The easiest and most applicable form of device security should be a mandatory device passcode that is required for access.  A device passcode policy complying with industry best practices including a complex passcode should be enforced upon all devices within a BYOD environment to prevent unauthorized access to the device.  Another consideration is the use of containerization in the form of a second password used to access corporate information.  A secondary...

Apple Releases Four iPhone 12 Models and the HomePod mini

HomePod mini Just as Apple did in its event, let’s get the HomePod mini out of the way first. The HomePod mini is easy to explain—it’s just a smaller, cheaper HomePod. For $99, you get a flat-topped sphere that’s about half the height and two-thirds the width of the HomePod, which currently lists for $299. It works just like a HomePod, accepting commands via Siri and integrating tightly with the rest of your Apple and HomeKit devices. You can even combine two HomePod minis into a stereo pair, though you...

Ransomware Threats - How secure are you?

How did this problem get so bad?  In essence, cyber criminals found that the payout is higher and easier with ransomware that other types of cybercrime.  Once other cyber criminal organizations noticed and caught on, the race was on.  To compound matters even further, companies have started increasingly purchasing cybersecurity liability insurance against ransomware attacks.  This is a double edged because if a company has liability insurance, then they will likely pay the ransom making them more enticing of a target.

iOS 14 Four Favorite Features

When you decide to take the leap and install—be sure to make a backup first, just in case—here are four features we recommend you check out right away.

Prev 1 ... 64 65 66 67 68 ... 147 Next