Archive for May, 2012

As we’ve see over the last several years, mobile security continues to dominate the headlines and trade show chatter. So how is the conversation around mobile security taking shape, so far, in 2012– what’s new and what can expect? Here’s a round-up of what top security experts and thinkers are predicting. Anti-Theft Protection – “If […]

As we’ve see over the last several years, mobile security continues to dominate the headlines and trade show chatter. So how is the conversation around mobile security taking shape, so far, in 2012– what’s new and what can expect? Here’s a round-up of what top security experts and thinkers are predicting. Anti-Theft Protection – “If […]

What We're Reading, Week of 5/21

Posted: 25th May 2012 by VPN Haus in Highlights
Tags: , ,

Network World- Sales of unused IPv4 addresses gathering steam Byte – Why IBM Turned Off Siri (and Dropbox and Lots Of Other Things) CIO- Why Office for iPad is Inevitable Scripps Howard News Service – Defense Workers Try Securing a New Way to Telecommute  Share this:EmailFacebookPrint

What We’re Reading, Week of 5/21

Posted: 25th May 2012 by VPN Haus in Highlights
Tags: , ,

Network World- Sales of unused IPv4 addresses gathering steam Byte – Why IBM Turned Off Siri (and Dropbox and Lots Of Other Things) CIO- Why Office for iPad is Inevitable Scripps Howard News Service – Defense Workers Try Securing a New Way to Telecommute  Share this:EmailFacebookPrint

By Sylvia Rosen Security breaches in are, no doubt, terrible for business owners. But when dealing with the healthcare sector, these breaches intensify in their potential for causing humiliating, or potentially, dangerous ramifications. In 2010, 42,275 people were affected by stolen, paper healthcare records, encouraging hospitals to make the switch to electronic health records. Still, industry experts […]