Companies’ IT infrastructures are growing more complex. With the rise in remote work and bring your own device (BYOD) policies, organizations have a more diverse set of corporate devices and…

Security 101
Beginner’s Guide to IT Asset Management
Companies’ IT infrastructures are growing more complex. With the rise in remote work and bring your own device (BYOD) policies, organizations have a more diverse set of corporate devices and…
Has your mobile device gone missing and you forgot to install a security software to track it?
If there’s one thing we learned from Equifax’s catastrophic breach: many people don’t create unique passwords. The attack that occurred in September of 2017 exposed the private information of over…
Theft simply happens, and you better be ready to face and get what’s yours back.
What is Data Security? Data security is the practice of protecting corporate and customer data against unauthorized use and exposure. It includes everything from discovering the data that a company…
Learn to identify why our passwords are so easy to guess by crackers, and improve your security just by using simple algorithms and techniques.
The second edition of our theft and loss statistics report brings new insights on where mobile devices are stolen the most, and who is responsible for it.
Every phone is a potential open door for hackers to steal information. If the President of the United States doesn’t prefer the secure lines -and risk revealing confidential information to spies- that doesn’t mean you should too, especially if you handle key assets for your organization.
The key to having a worry-less trip is… Worrying a bit beforehand! Prepare yourself for your trip with four must-cover tips on how to keep your mobile, and its data, safe while travelling around the world.
Did you know that those places were you feel more comfortable are the ones you are more at risk of having your phone stolen? Learn where, and why this happens.