As long as there have been cars, trucks, SUV’s or any other thing that has four wheels and drives, there have been auto thieves. Car companies have come a long way in theft deterrent and car alarm technology, but automotive thefts continue to occur everyday. As careful as one may be, it is still possible… Continue reading It’s all in the eyes. Security technology takes a bite out of car thefts.
We all know the old rule of never recycling passwords, but how many of us actually follow this advice? In a world where people are still using the word “password” as their password, it’s no wonder that data breaches are a common occurrence. About 65% of people use the same passwords for all their accounts,… Continue reading Is your password secure?
If you are thinking about using the cloud for your business but you’re concerned about security, there are new tools that can help. Cloud access security broker tools can add a layer of security that works in multiple ways, and they can be very easy to use. Cloud access security broker tools can encrypt data,… Continue reading How can we beef up our cloud security?
Technology has revolutionized the way we do everything, including shopping. Now instead of having to go to the store and hunt for everything on your list, you can click a few buttons and have it delivered right to your home. It’s even easier to make purchases from your mobile device. But with that great convenience… Continue reading 5 lessons from recent data breaches
Home security is usually the last thing on our minds until we have a breach. Planning for problems before they arise is key to maintaining good security. In the future, home security will involve much more than the latest deadbolt from the hardware store. The future of home security will be bio recognition. Your security… Continue reading The future of home security?
Heartbleed made the rounds in the media as the security threat du jour. What made Heartbleed so dangerous was that the OpenSSL protocol it exploited was utilized by most websites. Just about everyone was put at risk. I hate to be the bearer of bad news, but Heartbleed isn’t an anomaly; it’s one of many… Continue reading Your data is at risk: 5 eays to protect it
Personal safety and security has always been important, and technology provides more options for it than ever before. From securing your home to guarding your identity, there are certain steps everyone should take for adequate protection. Consider these four areas where technology can help protect you, and learn more about the devices and software that’ll… Continue reading 4 technological bodyguards everyone should have
Bitcoin has made about as many headlines — for good reasons and bad — as Osama Bin Laden did when American forces raided his compound and killed him. With so many people still on the fence about the digital currency, every story seems to sway them back and forth like a pendulum ticking down to… Continue reading Mt. Gox and the demise of Bitcoin
More companies are creating Bring Your Own Device (BYOD) policies since remote workers and employees are upgrading their personal technology with the newest smartphones and tablets. This can dramatically cut down on your company’s hardware costs, since workers can use their own devices for work and personal purposes. However, BYOD environments can quickly disintegrate when… Continue reading 4 Ways to Enhance Data Security in a BYOD Environment
One of the most annoying parts of the Edward Snowden revelations isn’t what everyone is focused on. It isn’t that the NSA has been snooping on anyone and everyone they can. It isn’t that they seem to have their fingers in places that were once considered virtually impossible to hack. It isn’t even the poor… Continue reading Tech giants can’t (or won’t) protect your data when push comes to shove