How Losing Your Phone can Mean Losing Your Identity

In the age of technology, there are more way than ever to steal a person’s identity. It doesn’t take someone with an IT job to do it these days. A lost phone, and especially a smartphone, is a goldmine of personal information for identity theft. Here are some ways that most people make themselves vulnerable […]

Managing Risk in IT Security for Mid-Sized Companies

Hackers, stolen identities and more are terrible words and phrases that come to mind when we think of breeches in security. When it comes to a mid-sized business, you need to worry about the security of the company but also of the customers who use your services or products. How can you lower the risk […]

IBM Announces New Big Data Security Tool

What if you deployed technology to discover which of your employees was disgruntled and posed a potential security threat to your organization? As the CIO thus far you have deployed Big Data applications and implementations you give you competitive insights and market advantages but have you considered the potential security benefits to internal operational Big […]

A Company-wide Mobile Device Security Training Program for New Hires

A Primer for IT CIOs By Vanessa James Like it or not BYOD (Bring Your own Device) is becoming more entrenched in today’s IT business culture. In turn, it may be safe to say that this rapid occurrence has caught many managers within the industry off guard, at least to some extent, for along with […]

Stealth Internet Tracking Practices Increase

For many of us the Internet is like a new pet, we love to play with it but sooner or later we know we are going to get bitten. We know that our digital footprint is being tracked and recorded, mined and sold many different ways, but many of us do not care, at least not […]

IT Security is Cloud Centric

For IT security, Gartner analysts are predicting that 2013 is going to be about expansion of cloud computing and the struggle by the enterprise to achieve appropriate security for it. According to Gartner, by 2015, 10% of overall IT security enterprise capabilities will be delivered in the cloud. Is BYOD part of the problem or […]

Dropbox Corporate Usage Grows As Does Security Concerns

The issue: Dropbox in becoming increasingly popular. They claim 100 million users and many workers including IT pros use it at the office. This trend should be cause for some concern to IT departments because of the increased chance of critical data loss and security breaches. Why: Many users enjoy the convenience of using Dropbox […]

Connect Using 4G & Upgrade Your Mobile Security

Image courtesy of Stuart Miles /

New dawn emerges and another upgrade of cell phone technology has been produced. Due to innovations 4G was produced such as HSPA (High Speed Packet Access), LTE  (Long Term Evolution) and WiMAX wireless technology has been developed. Phones which belong to a 4G category have download and upload speed 10 times faster than 3G phone’s […]

Security Apps for the iPhone: The Smartest Way to Secure

mobile security apps

Apple’s iPhone is undoubtedly ruling the mobile industry. Since its birth, it has gained immense popularity among the users. Though Apple has been strict when it comes to maintaining regulations pertaining to the availability of the apps in ensuring a fully secured device, yet they can be susceptible to some problems. Therefore it is essential […]

Online Shopping Safety Tips to Ensure Computer and Personal Security

Image courtesy of Pixomar /

As the Holidays approach, early bird shoppers are looking for the best deals available to make their loved ones happy.  Sometimes, these deals are “online only,” located on many of our favorite sites, leading to approximately $32.6 billion dollars spent online in 2010. With the increased familiarity of online shopping, as I-pads, Android phones and […]