4 Ways to Enhance Data Security in a BYOD Environment

More companies are creating Bring Your Own Device (BYOD) policies since remote workers and employees are upgrading their personal technology with the newest smartphones and tablets. This can dramatically cut down on your company’s hardware costs, since workers can use their own devices for work and personal purposes. However, BYOD environments can quickly disintegrate when… Continue reading 4 Ways to Enhance Data Security in a BYOD Environment

The history of encryption

Sensitive data has always been a challenge to deliver securely. Even in the days of the Spartans, military commanders would use ingenious encryption techniques to communicate with each other across distances. Today, we have an ongoing battle for data security that pits the brilliant minds of encryption experts with the equally-brilliant hackers trying to get… Continue reading The history of encryption