Posted by Ryan Swindall on January 23, 2012
Recently, federal authorities took action to shut down the Web site of MegaUpload, accusing its operators, who could face 20 years in prison, of copyright infringement.
Posted by Ryan Swindall on December 29, 2011
361 million >> 144 million >> 4 million that’s the total number of records compromised each year from 2008 – 2010 as a result of data breaches, according to a joint Verizon and United States Secret Service report. After years of increasing losses climaxing in 2008 with a record-setting 361 million records compromised, it was not clear if the 2009 drop to 144 million was an aberration or a sign of things to come. The 2010 total of four million compromised records seems to suggest it was a sign. But of what?
Posted by Ryan Swindall on December 22, 2011
At this point I don’t think Charles Dickens’s character Ebenezer Scrooge would say "Bah, humbug!" to an iPad for the holidays. A recent Nielsen survey shows that our appetite for Apple devices is growing – with the iPad leading the pack.
Posted by Reza Nabavi on December 9, 2011
Over the past year, we've seen the iPad become more prevalent in the corporate world – and why not? Its portability is ideal for employees on the go and users are able to blend work and personal use on a single device. Yet, it’s these two benefits that have introduced new security concerns for IT, with the iPad often treated more like a grown up iPhone than a corporate computer.
Posted by Reza Nabavi on December 8, 2011
Today, malicious apps and malware continue to be the number one security threat in tablets, followed by public Wi-Fi eavesdropping. Tablets can easily be infected by clicking on a malicious link or by entering company credentials into a phishing page mimicking itself as a challenge page.
Posted by Nina Seth on December 6, 2011
An article in GigaOM citing new research by Unisys on the consumerization of IT recently piqued my interest. According to the research, IT pros underestimate the use of consumer technologies in the workplace by a whopping 50%. In fact, IT decision-makers gave themselves a rating of only 2.9 for overall support of employee owned mobile devices, social appli
Posted by Ryan Swindall on December 1, 2011
In 2010, Oracle surveyed more than 3,000 people from around the globe to discover how people communicate. The overwhelming response was mobile, mobile, mobile. In 2011, Oracle conducted a second survey calling it The Future of Mobile Communications-Take Two. This upgraded report delivered interesting results about mobile phone usage and the perceptions of mobile devices.
Posted by Ryan Swindall on November 10, 2011
November 11th is Veterans Day. It’s a day to honor United States’ veterans of all conflicts for their patriotism and willingness to serve. Veterans Day was originally established to honor Americans who had served in World War I. Since then, it has become a national holiday that is celebrated on November 11, the anniversary of the day World War I ended in 1918.
Posted by Ryan Swindall on November 3, 2011
Walk around any organization today and you will see people using the newest and coolest PCs, smartphones, and tablets. It’s not just the normal suspects that love the IT gadgets. It’s everyone from the CEO to the summer intern. Even my mom got an iPad and is getting in on the action. It’s so easy to download emails and send photos to relatives. She takes it with her everywhere—even work. Everyone loves these devices at home and work because they’re easy to use.
Posted by Ryan Swindall on October 31, 2011
For most people outside the IT profession, the scariest thing they deal with on Halloween is a spooky costume or the newest episode of AMC’s ghastly drama “The Walking Dead.” For IT professionals, a data breach is far worse. With the frequency and cost of data breaches on the rise, it’s easy to see why the topic worries IT professionals. In its fifth annual TITLE survey the Ponemon Institute showed a significant spike in legal defense spending to address fears of successful class actions resulting from customer, consumer or employee data loss.