Tag Archives: Business

BYOD – Should family members use the device?

BYOD (Bring your own device) is a great concept and it can work.  I recently read an article on an opinion that made mereally think of how some look at this concept and its security as though the IT pros … Continue reading

Posted in Computers | Tagged , , , , , , , , | Leave a comment

FBI Credit Card Ring Bust Exposes PCI Challenges – Dark Reading

Some experts say existence of complex credit card fraud black market a sign that PCI isn’t effectiveFBI Credit Card Ring Bust Exposes PCI Challenges – Dark Reading.

Posted in Computers | Tagged , , , , | Leave a comment

Privacy hackers | Homeland Security News Wire

The U.S. Federal Trade Commission (FTC) has charged two businesses with illegally exposing the sensitive personal information of thousands of consumers by allowing peer to peer file-sharing software to be installed on their corporate computer systems…Privacy hackers | Homeland Security News Wire. The … Continue reading

Posted in Business, Computer Security, Computers | Tagged , , , , , , , | Leave a comment

A graph that shows how websites connect and how data can be collected

Just saw a student’s post on an add-on you can get for Chrome.  Adam shared a link to Collusion for Chrome at Chrome’s webstore.  This add-on compiles information from the websites that bind to one another and builds a graph … Continue reading

Posted in Computers | Tagged , , , , , | Leave a comment

Just click away – it’ll be ok…

Here’s 10 things the younger generation is doing online and how they can stop behavior that can lead to malicious theft of data and great food for thought about their online reputation. 10 things Gen Y do online.. and shouldn’t.  … Continue reading

Posted in Computers | Tagged , , , , , , , , , , , , , | Leave a comment

Generation Y Won’t Listen To IT

The latest generation of desk-jockey’s admitted in a recent CISCO study that they frequently ignore and/or circumvent the information technology (IT) policies of their employers, heightening corporate risk. The ISCO Connected World Technology Report surveyed some 2,800 college students and young … Continue reading

Posted in Computers | Tagged , , , , | Leave a comment

The Three Most Frequently Attacked Mobile Devices

“iPads pose the worst risk as far as data leakage in concerned since they are mainly used for consumption of enterprise information in various form of documents,” says Guy Levy-Yurista, vice president of products and development for AirPatrol. “This sensitive … Continue reading

Posted in Business, Computer Security, Computers, Education, Hacking, Health, Information Technology, network, Networking, Technology, Wireless | Tagged , , , , , , , , , , , , , , | Leave a comment