Recent Entries

Light Can Keep the Dark at Bay
Video Thumbnail: Light Can Keep the Dark at Bay

Light Can Keep the Dark ...

We are all afraid of the unknown. Why? Because we all want to be in control of our lives: what career path to take, how to deal with our finances, where to go for a vacation. We like certainty. We love to know what’s ahead of us. We are hard wired like this. As far as technology is concerned, we don’t know what the next innovation would be like—how a product or service would affect our lives and the way we do things. Technology keeps surprising us. Yes, we have an idea of what could be the next trend because it is us consumers who dictate it, but that’s as far as we can go. Unfortunately, most vendors make their products with security at the bottom of their priority lists. The public is generally kept in the dark as to what goes inside a product. Nobody holds any guarantee. If...
Mobile Virtualization – Solving the BYOD Problem
Video Thumbnail: Mobile Virtualization – Solving the BYOD Problem

Mobile Virtualization – ...

For many users today, how they use technology is defined by mobile devices. Their primary device is not a desktop computer, or even a laptop. Instead, it’s a tablet or a smartphone. Instead of data stored on a hard drive or a USB stick, corporate data is now stored in the cloud and accessed as needed by users. If we look at the number of PCs versus smartphones sold, the trend is clear. In the 3rd quarter of 2014, analysts estimate that 79.4 million PCs were sold – compared to 301 million smartphones in the same period. This changes the relationship that IT has with end users. In the past, they would have given their users PCs that they could centrally control. However, for many organizations, that policy has not been acceptable: mobile devices are thought of as “personal” in...
Setting Up Your Gadgets Securely
Video Thumbnail: Setting Up Your Gadgets Securely

Setting Up Your Gadgets ...

It’s that time of year again – the last quarter of the year is a time for many of us to buy a new smartphone, as we look at the new devices launched relatively recently by Apple, Samsung, and all the other phone providers and decide which one we shall use for the duration of our next smartphone contract. I’m sure that many of us will take home brand new iPhones and Android devices and set it up just the way we want our personal devices to be. We should take a minute to remember, however, that because these devices are so personal to us, the damage a hacked smartphone can do to is significant. Imagine what would happen if a hacker stole your personal data. We don’t have to imagine, however, as this has happened to many users in 2014. At the very least, this is embarrassing to the...
Data Breaches: Almost Like Clockwork
Video Thumbnail: Data Breaches: Almost Like Clockwork

Data Breaches: Almost Li...

Last year, as part of our predictions for 2014 we said there would be one major data breach every month. At the time, many people said that our prediction was overly pessimistic. It was one prediction I would have been happy to have gotten wrong. Unfortunately, I haven’t been proven wrong. We’ve seen major data breaches hit large institutions left and right. In many cases, these breaches have been due to attacks of point-of-sale (POS) malware that hit these companies. In other cases, attackers got into their networks directly and stole the information of their users. People may think that financial information is the most valuable information that can be lost, but that’s not always the case. Banks and other financial institutions are very good about not letting consumers eat the...