Category Archives: Internet of Things

Cars Hit a Cybersecurity Speedbump at the #LAAutoShow

As a technology blogger and gearhead, I was fortunate to get up close and personal to the newest cars and technologies during one of the media days before this year’s Greater Los Angeles Auto Show. What I found, however, was … Continue reading

Posted in Cybersecurity, Internet of Things, Mobile Malware, Tech Equipment | Leave a comment

When Art Imitates Life – A Review of “I.T.” the Movie

Recently, I saw “I.T.” the movie starring Pierce Brosnan as a visionary CEO named Mike Regan. In the movie, Regan is planning to take his company public, and soon after the movie begins, Regan makes a presentation to a large … Continue reading

Posted in Disaster Recovery, Internet of Things, Mobile Computing, Network Security, Online Privacy, Online Security, Tech Equipment | Leave a comment

Three Security Concerns for 2016

As we near the end of 2015, what will 2016 look like in the information security sector? Undoubtedly there be an increase in data breaches across all industries, but will businesses take the high road and inform their customers and … Continue reading

Posted in Business Process, BYOD, corporate data, Data Breach, data protection, Data Security, Internet of Things, Mobile Malware | Tagged , , , , | Leave a comment

Does Your Business Offer Mobile Payments?

There are many ways that your business can stand out. Your brand can have a unique name, think Google, Zappos, or Amazon. You can create a new way to provide your product and inject innovation into a stagnant industry, think … Continue reading

Posted in Cloud Computing, Cybersecurity, Internet of Things, Mobile Computing, Online Security, Tech Equipment | Tagged , , | Leave a comment

Don’t Forget Security When Developing Corporate Mobile Apps – Time for Another Look

About a year ago, I wrote a post about the importance of security when developing mobile device apps. As part of the post, I also discussed the importance of security when evaluating the “bring your own device” to work (BYOD) … Continue reading

Posted in BYOD, Data Breach, Data Security, Internet of Things, MSP, Privacy Rights | Tagged , , , , | Leave a comment

Don’t Forget Security When Developing Corporate Mobile Apps

With the rise in mobile device usage, bring your own devices to work (BYOD), the Internet of Things (IoT), combined with the decline of personal computers, many corporate leaders believe that their businesses should develop a mobile application, or in … Continue reading

Posted in BYOD, Cybersecurity, Internet of Things, Mobile Computing, Online Security | Tagged , , , | 2 Comments

Drones: The Next Great Hack

As a kid, one of my favorite hobbies was flying radio control airplanes. Back in the day, we used to hang a colored flag off our antennas to notify other hobbyists what frequency we were on. If someone nearby had … Continue reading

Posted in Data Security, Internet of Things, Privacy Rights, Tech Equipment | Tagged , , | Leave a comment

There Is No Silver Bullet Solution When It Comes to Cyber Security

IBM recently published its “Security Services Cyber Security Intelligence Index” report, an analysis of cyber security attacks and incident data from its worldwide security operations. I had an opportunity to connect with Nick Bradley, Practice Lead, Threat Intelligence and Analysis, … Continue reading

Posted in Business Process, BYOD, Cybersecurity, Data Security, Internet of Things, Network Security | Leave a comment

Bluetooth Low Energy: A Technology That Can Raise Your Blood Pressure

Have you ever wanted to know if a pair of pants on display on the other side of the store is on sale? If you answered yes, well, your phone can now alert you. A technology known as Bluetooth Low … Continue reading

Posted in Bluetooth Technology, Internet of Things, Tech Equipment | Leave a comment

Internet of Things? More Like the Internet of Attack Vectors

Everyone is excited about the “Internet of Things,” also known as, IoT. Imagine, cars able to talk to other cars, devices able to contact repair facilities when repairs are needed, cars able to connect to the traffic grid, and refrigerators … Continue reading

Posted in Data Security, Internet of Things, Network Security, Online Security | Leave a comment