The cyber-threat scene is ever-changing. Stay up to date with this year’s malicious trends to ensure your business’ infrastructure isn’t caught off guard.
Mobile devices like Chromebooks and iPads are coming to change the way schools connect their students to new technologies. Out with stationary computers, in with mobile devices!
If there’s one thing we learned from Equifax’s catastrophic breach: many people don’t create unique passwords.
From Whatsapp, to Apple’s iPhone encryption, law enforcement has always looked for back-doors to access protected user data. The industry’s stand? With the users, always.
What’s on a remote worker’s company-owned device? Everything. From the marketing department’s next quarter program, to the sales team’s target accounts.
This week’s recap might feel a bit like Skynet is taking over, and it would explain quite a lot of things!
Lay-off procedures are more than just awkward situations, they can also be a risk to your company’s secrecy and data infrastructure.
We know managing vast mobile fleets can be a pain in the you-know-what. Especially when they are chock-full of both private and corporate sensitive data!
We’ve hit three decades of Got(IT)! Well, ok, thirty posts, not years, but we will get there!
With the arrival of the General Data Protection Regulation (GDPR) this May 25th, we worked to make the example and further develop our platform’s Privacy core.