Smartphones have become so advanced that there’s virtually no business task they can’t handle. Now everyone uses mobile devices to access work documents and, naturally, hackers got the memo. There are thousands of threats targeted towards mobile devices, so you’d be well served backing up the files in your mobile device, now. Malware on mobile […]
Employees today are working under tight timelines, but thanks to bring your own device (BYOD) policies, they can access critical files and applications to get work done on their smartphones. But BYOD can be a double-edged sword to those who are not vigilant about cyberattacks. If you’re using an Android device, here are five security […]
“This cyber threat represents one of the most serious economic and national security challenges we face as a nation.”
Howard Schmidt made this statement in December of 2009, shortly after he was appointed to the newly created position of White House Cybersecurity Coordinator.
Cyber-security analysts predict that 2011 will mark a shift in online crime away from malware and stolen credit card information into a new stage of cyber-espionage and cyber-sabotage. Identity theft has already become one of the most prevalent crimes of the 21st century.