The advent of new technologies are in pace with the needs of consumers for convenience and comfort. How easy is it to work out of a hotel room in one of the advanced cities of Asia or Africa and send files for an early morning meeting in the U.S.? The world is global indeed. So, are the ri ...
Read MoreThe Morto Worm very recently became the first worm to use a list of common ids and passwords to gain remote desktop access to Windows systems via the Windows remote desktop protocol (RDP) in order to spread itself. As soon as it gains access to a single system on your network, it replaces system co ...
Read MoreWhere would security fall when our data is in a shared space, when privacy is of great concern and breaches are occurring every day even in a secure network? Private clouds seem to be the answer. Private clouds sit in a public facility on a dedicated system with very specific service-level agre ...
Read MoreCompanies may have to start spelling out security policies for mobile devices since there are no written ones, or if they do exist, they are ambiguous. Employees are provided with mobile phones so they are reachable any time, any where. This means the employee may answer the phone while drivin ...
Read Morehttp://www.youtube.com/watch?v=rJZNYuMclNM&feature=youtu.be Social media has expanded from entertaining and exciting "Flash Mobs" to much more sinister events called "FLASH ROBS". "Flash Mobs" refer to spontaneous dancing or other antics of a group of people while "Flash ROBS" are when dozens of peo ...
Read More