Security Corner:

Mobile

1

June 26, 2015  2:04 AM

Samsung making Microsoft a little unhappy

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Apple, Business, laptop, Microsoft, news, samsung, Security, Updates, Windows

You know the person in your office who leaves their passwords taped to the front of their monitor? Sure you do. They're putting everyone's data and hard work at risk because they've short-circuited the security process. It's not nice and it sometimes could cost the company money.

February 8, 2015  7:09 PM

How tight does your security really have to be?

Ken Harthun Ken Harthun Profile: Ken Harthun
Cyberattacks, Hackers, Security, Sony, Targeted Attacks

laptopinchainsIn the wake of...


January 1, 2015  8:29 AM

Paranoia and Personal Security – Redux

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Data, Mobile, Security, Technology

I got a lot of feedback for my last column of 2014 and not all of it was complimentary. You see, some of the theories I shared and opinions I voiced were based on a decade of being an early adopter of new technology. It placed me in a land where my perspective was polluted because I...


December 24, 2014  6:09 PM

Apple Pushes out Security Update — HORRORS!

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Apple, Data, news, Security, Update, Windows

To hear Apple fanatics tell the story, the recent (and supposedly first ever) automatic security update marks the end of the company. Apple is doomed now that it has gone the way of MSFT and 0 Comments     RSS Feed     Email a friend


October 8, 2014  4:22 PM

Photos that Expire – New App from MSFT

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Android, Data, IOS, Microsoft, Security

A news story just came across my desk touting the benefits of photos that expire. Just like a Mission Impossible assignment, the data shared expires after a short period of time....


September 18, 2014  8:17 PM

Has Apple received an order under the Patriot Act?

Ken Harthun Ken Harthun Profile: Ken Harthun
Apple, Security, USA Patriot Act

According to ZDNet, Apple has removed the warrant canary from their transparency report,...


July 11, 2014  6:14 PM

Highly effective security: Secure your mobile devices from loss

Ken Harthun Ken Harthun Profile: Ken Harthun
Laptop Security, Mobile device security, Security, Tablet PCs

Mobile devices such as smartphones, tablets and laptops are certainly convenient; however, due to their portability they are security risks. It's just too easy to lose or misplace these devices and when this happens, all of your personal data stored on them is at risk of being compromised. You...


May 19, 2014  7:52 PM

Introducing 10 highly effective security habits

Ken Harthun Ken Harthun Profile: Ken Harthun
Disk Encryption, Mobile device security, Security policy, Social media security

We all have our preferred security habits (at least, I hope so!) Some of them are for our own comfort and some of them are actually highly effective. In my next few posts, I am going to discuss the ones I consider are most effective. I plan to outline the pros and cons of full drive encryption,...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: