Monthly Archives: February 2014

What Policies Appear On Your Website?

Like many businesses, you probably maintain Facebook, Twitter, YouTube, and LinkedIn accounts to promote your product or service. If your leadership and IT teams listen to your marketing and PR teams, these social sites link back to your main website. … Continue reading

Posted in Online Privacy, Online Security, Privacy Rights, Terms of Service | Tagged , , | Leave a comment

The Newest Event at the Olympics: Electronics Hacking

If you own a business, you should be very worried for the next couple of weeks. You may not be making any large purchases, hiring entire departments of personnel, or launching new products, but your data may be at risk … Continue reading

Posted in Business Process, BYOD, Cybersecurity, Data Security, Management and Technology, Network Security, Online Privacy, Online Security, Tech Equipment | Tagged , , | Leave a comment

How Secure Are Your BYOD Devices in the Workplace?

By now, everyone in the business world knows what the four initials BYOD mean. But if not, it stands for Bring Your Own Device to work. This means that, for a variety of reasons, employees bring their smartphones and tablets … Continue reading

Posted in Business Process, BYOD, Data Security, Management and Technology, Mobile Computing, Network Security, Online Security, Tech Equipment | Tagged , | 2 Comments