Video Thumbnail: Light Can Keep the Dark at Bay

Light Can Keep the Dark ...

We are all afraid of the unknown. Why? Because we all want to be in control of our lives: what career path to take, how to deal with our finances, where to go for a vacation. We like certainty. We love to know what’s ahead of us. We are hard wired like this. As far as technology is concerned, we don’t know what the next innovation would be like—how a product or service would affect our lives and the way we do things. Technology keeps surprising us. Yes, we have an idea of what could be the next trend because it is us consumers who dictate it, but that’s as far as we can go. Unfortunately, most vendors make their products with security at the bottom of their priority lists. The public is generally kept in the dark as to what goes inside a product. Nobody holds any guarantee. If...
Video Thumbnail: Mobile Virtualization – Solving the BYOD Problem

Mobile Virtualization – ...

For many users today, how they use technology is defined by mobile devices. Their primary device is not a desktop computer, or even a laptop. Instead, it’s a tablet or a smartphone. Instead of data stored on a hard drive or a USB stick, corporate data is now stored in the cloud and accessed as needed by users. If we look at the number of PCs versus smartphones sold, the trend is clear. In the 3rd quarter of 2014, analysts estimate that 79.4 million PCs were sold – compared to 301 million smartphones in the same period. This changes the relationship that IT has with end users. In the past, they would have given their users PCs that they could centrally control. However, for many organizations, that policy has not been acceptable: mobile devices are thought of as “personal” in...
Video Thumbnail: Setting Up Your Gadgets Securely

Setting Up Your Gadgets ...

It’s that time of year again – the last quarter of the year is a time for many of us to buy a new smartphone, as we look at the new devices launched relatively recently by Apple, Samsung, and all the other phone providers and decide which one we shall use for the duration of our next smartphone contract. I’m sure that many of us will take home brand new iPhones and Android devices and set it up just the way we want our personal devices to be. We should take a minute to remember, however, that because these devices are so personal to us, the damage a hacked smartphone can do to is significant. Imagine what would happen if a hacker stole your personal data. We don’t have to imagine, however, as this has happened to many users in 2014. At the very least, this is embarrassing to the...
Video Thumbnail: Data Breaches: Almost Like Clockwork

Data Breaches: Almost Li...

Last year, as part of our predictions for 2014 we said there would be one major data breach every month. At the time, many people said that our prediction was overly pessimistic. It was one prediction I would have been happy to have gotten wrong. Unfortunately, I haven’t been proven wrong. We’ve seen major data breaches hit large institutions left and right. In many cases, these breaches have been due to attacks of point-of-sale (POS) malware that hit these companies. In other cases, attackers got into their networks directly and stole the information of their users. People may think that financial information is the most valuable information that can be lost, but that’s not always the case. Banks and other financial institutions are very good about not letting consumers eat the...
Video Thumbnail: To Mobile App Developers: Compete on Privacy and Security, Too

To Mobile App Developers...

There are many mobile app developers today who want to develop the next hot mobile app. After all, if you pay your cards right, you could end up being bought by a much larger company like Facebook, Google, or Microsoft for billions of dollars. It’s hard enough to build a mobile app that will have the features and ease of use that will make it popular with millions of users. There are other things that apps can compete on, however: this includes the privacy and security of their users. How can developers do this? First of all, consider how the app is written. Are best practices being followed? Developers on PCs and Macs have already learned that their apps can suffer from vulnerabilities that can be exploited. Are you doing your best to avoid these issues? One reason to harden your apps...
Video Thumbnail: Rebuilding Trust: Is Your Data Safe?

Rebuilding Trust: Is You...

For the past year or so, I’ve noticed that people are increasingly concerned about how protected their information is – not just from hackers, but from governments and large Internet companies as well. Individual users and organizations are now saying – more than ever before – that privacy and security matters. Of course, the desire for privacy and security is sometimes trumped by the desire for added convenience and features. However, one thing that will cause changes in how data is protected is government regulation. In some quarters, it is perceived – rightly or wrongly – that private companies cannot be trusted with the data of their users, and that the government must step in with regulations. The European Union is planning new regulations that will control how...