Archive for the ‘Mobile’ Category

It’s a tough time to be a BlackBerry user.  Despite having a committed fan in the Oval Office and some new features to brag about, including a digital assistant, BlackBerry has seen Android, Apple and Microsoft phones completely erode its market share. Its popularity has actually receded so far that BlackBerry is now less popular […]

The discussion on BYOD centers on whether employees working more efficiently on their personal devices is worth whatever network security vulnerabilities are sown when enterprises allow numerous devices and operating systems to access their networks. As a compromise between employees and employers that brings everyone onto the same page, a BYOD policy helps. But, it […]

The Department of Homeland Security (DHS) issued a warning last week that the computer network of a public utility company had been compromised by a “sophisticated threat actor,” likely through a brute force password attack. Although the utility company repelled the attack, and there is no evidence that operations were affected, the DHS’ Industrial Control […]

In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce strict working hours than they are today. After all, work wouldn’t get done if employees weren’t present. Mobile technology has since enabled the growing trend of remote work, […]

Cybersecurity threats are constantly evolving, and for IT teams looking to patch the latest vulnerability (i.e. Heartbleed), trying to prevent the next attack is a full-time job in itself. However, it’s not very often that we have a chance to examine some tangible information about the threats we’re trying to safeguard against. That’s why research […]