Category Archives: Tech Equipment

Cars Hit a Cybersecurity Speedbump at the #LAAutoShow

As a technology blogger and gearhead, I was fortunate to get up close and personal to the newest cars and technologies during one of the media days before this year’s Greater Los Angeles Auto Show. What I found, however, was … Continue reading

Posted in Cybersecurity, Internet of Things, Mobile Malware, Tech Equipment | Leave a comment

When Art Imitates Life – A Review of “I.T.” the Movie

Recently, I saw “I.T.” the movie starring Pierce Brosnan as a visionary CEO named Mike Regan. In the movie, Regan is planning to take his company public, and soon after the movie begins, Regan makes a presentation to a large … Continue reading

Posted in Disaster Recovery, Internet of Things, Mobile Computing, Network Security, Online Privacy, Online Security, Tech Equipment | Leave a comment

Why the Apple-FBI Feud Affects YOU!

While the eyes of everyone in the technology sector watched the Apple-FBI feud about a key to unlock a terrorist’s iPhone, you should have been watching too. You might wonder why this situation affected you, and the reason is simple. … Continue reading

Posted in data protection, Data Security, Mobile Computing, Online Privacy, Online Security, Privacy Rights, Tech Equipment, Terms of Service | Leave a comment

When Making Your New Year’s Resolutions, Don’t Forget Your InfoSec Resolutions

There are the common New Year’s resolutions like unplugging more often, planning more vacations or staycations, reading more books, writing a book, and losing weight. But, in today’s connected and always plugged in world, it’s easy to ignore technology. So, … Continue reading

Posted in Business Process, BYOD, Cloud Computing, corporate data, Cybersecurity, Data Breach, data protection, Data Security, Disaster Recovery, Management and Technology, Network Security, Online Security, Tech Equipment | Tagged , , , , | Leave a comment

Does Your Mobile Strategy Include Mobile Capture Technology?

Thanks to evolving technology, it seems as if some form of new technology is introduced every week. One new technology is referred to as mobile captures. No, this doesn’t mean taking a photo of something from your smartphone or mobile … Continue reading

Posted in Business Process, Mobile Computing, Online Privacy, Online Security, Tech Equipment | Tagged , , , , | 1 Comment

Does Your Business Offer Mobile Payments?

There are many ways that your business can stand out. Your brand can have a unique name, think Google, Zappos, or Amazon. You can create a new way to provide your product and inject innovation into a stagnant industry, think … Continue reading

Posted in Cloud Computing, Cybersecurity, Internet of Things, Mobile Computing, Online Security, Tech Equipment | Tagged , , | Leave a comment

12 Timeless Password Tips for Improved Security

According to Splashdata, the #1 and #2 most commonly used passwords are “123456” and “password,” so the creation of strong passwords is one way that users can be proactive in fighting security breaches. Since passwords are the core of an … Continue reading

Posted in Business Process, Data Security, Network Security, Tech Equipment | Tagged , , , | 1 Comment

A Cheat Sheet to Translate InfoSecurity for Key Business Units

As a result of working with many different business units over the last decade, I’ve developed my ability to help companies by bridging the business and technology gap – and align technology strategies with business objectives. Toward that end, I … Continue reading

Posted in BYOD, Data Breach, Data Security, Management and Technology, Network Security, Tech Equipment | Tagged , , , | Leave a comment

Don’t Forget Security When It Comes to E-Waste

With school back in session and Halloween just around the corner, the December holidays will soon be here. And with December holidays quickly approaching, it’s time to start dreaming about all the new technology purchases on your holiday shopping list. … Continue reading

Posted in Data Security, Network Security, Tech Equipment | Tagged , , , | Leave a comment

Do Your Customers Want to Be Tracked?

A major entertainment company recently made news when it announced a new tool available at its theme parks. Under the guise of making visits more “fun and easy,” theme park guests are now able to wear a type of bracelet … Continue reading

Posted in Bluetooth Technology, Cybersecurity, Data Security, Mobile Computing, Privacy Rights, Tech Equipment | Tagged , , , , , | 1 Comment