Recent Posts

Protecting Your Wordpress Website from Hackers in 2015

JohnDSaunders
Protecting your WordPress website from hackers in 2015 will be a bit more complicated than adding a secure password to your login screen. We’ve seen it all. Hackers, like tiny mice that search for small nooks and crannies in your website’s framework, use every trick in the book to bypass your protection parameters. In the last few days, there was a HUGE WordPress website hack that exploited an outdated plugin that compromised more than 100,000 websites!
Protecting Your Wordpress Website from Hackers in 2015

The Challenge of Managing BYOD Expenses

Rick Delgado
Companies need to know that as attractive as BYOD can be, that doesn’t mean they should ignore the costs that can come with it. Few policies are without some drawbacks, so a realistic approach to BYOD can foster the benefits while appropriately examining the costs. With the right plan in place, the transition to BYOD can be a smooth and productive process, paying dividends for many years to come.
The Challenge of Managing BYOD Expenses

Are You Likely to Fall for a Phishing Scam? Google Thinks So

Eugene Bekker
Think you can tell a fake email from the real deal? You’d be surprised. A new Google study finds that phishing scams are more successful than we thought.
Are You Likely to Fall for a Phishing Scam? Google Thinks So

Do You Feel Good About Your Social Media Cyber Security?

MarketingXLerator
Cyber security, or rather the lack thereof, is one of the main threats of our time. Learn how to keep your social media channels safer in 2015.
Do You Feel Good About Your Social Media Cyber Security?

Is a Recent California Court Ruling a Killer Blow to BYOD?

JaredJaureguy
Some mobile management tools allow companies to monitor devices, and differentiate between work-related and personal usage. This makes it much easier to determine what should be reimbursed. However, this introduces additional privacy issues that employees may not be comfortable with. Make sure BYOD policies are clearly communicated to employees, so they understand what expectations are, and what will be covered by the company.
Is a Recent California Court Ruling a Killer Blow to BYOD?

Identity Theft and Holiday Cheer Don’t Mix: Tips to Keep Your Information Safe

Laura Bruck
The holidays are a time ripe for fraud and identity theft. Here are some precautions to help you protect your information during this busy shopping season.
Identity Theft and Holiday Cheer Don’t Mix: Tips to Keep Your Information Safe

Buddy Profiling: The Latest Big Data Tool

GilAllouche
Our social networks have incredible value in collecting data for business decisions.
Buddy Profiling: The Latest Big Data Tool

Privacy Concerns to Escalate as Mobile Dominates in 2015

Daniel Green
It’s clear that the ability of mobile apps to protect the data of their users will help define and differentiate brands next year, and as we have seen with Uber and Facebook, what the company then does with your personal data will also be closely monitored by wary consumers across the globe.
Privacy Concerns to Escalate as Mobile Dominates in 2015

How the Grinch Stole Your Data: 7 Holiday Scams to Watch Out For

Rick Delgado
As always, the best defense is to be vigilant during the holiday season. Always check your accounts and report any suspicious purchases immediately. Do this and you’ll feel a lot safer as you go shopping for the rest of the year.
How the Grinch Stole Your Data: 7 Holiday Scams to Watch Out For

Your Terrible Password Is Costing You Business

Rick Delgado
If you focus on these ideas and tips, you’ll have much better passwords that will go a long way toward ensuring your business is protected. Don’t overlook the importance of a strong password; the first line of defense should alway be prepared for all potential outside threats.
Your Terrible Password Is Costing You Business