Category: Blog
-
Adapt Your Information Security To Meet The Challenges Of Tomorrow
There is a basic recipe for network and computer security that most organizations follow without question: The network firewall guards the perimeter, and anti-malware software protects the various endpoints. Security is based on protecting the individual servers and PCs inside the perimeter from the various threats outside of the network perimeter. However, that formula is…
-
Why 2013 was the year of the personal data breach
As 2013 winds to a close, it’s time to look back at the biggest security events and incidents of the year. Here’s hoping there are some lessons to be learned—something to provide a foundation for stronger protection and a safer online and mobile world in 2014 and beyond. With each passing year, the world of…
-
Gift Ideas For The Mobile Device User Who Has (Almost) Everything
Less than a week left until Christmas. If you’re still looking for gift ideas for that special person in your life, time is running out and you’re probably starting to feel a bit desperate. Well, if that person has a smartphone or tablet, I have a few ideas that might take you very quickly from…