If you operate with an iPhone or Android phone, you might be in for a security struggle if your device is lost or stolen

If you operate with an iPhone or Android phone, you might be in for a security struggle if your device is lost or stolen

Your Exchange server can be configured to enforce minimum security requirements so that when a device attempts to connect but does not meet the credentials it will not be allowed access. Firms must regularly review policies on system configuration to ensure that precautions are being implemented to protect the firms shared data. Here are possible...

avatar
Duleep Pillai
July 10, 2014
Discover More
If you operate with an iPhone or Android phone, you might be in for a security struggle if your device is lost or stolen

Secure Remote Access in Your Organization

There are many software desktop tools, support professionals, and providers that offer remote access and management to computers, laptops, and pretty much every device imaginable. Now that cloud storage has made access to information more convenient across an organization, the risk of data security has increased as cloud servers are susceptible to attacks. There are...

avatar
Duleep Pillai
July 9, 2014
Discover More
If you operate with an iPhone or Android phone, you might be in for a security struggle if your device is lost or stolen

Six advance notifications for Microsoft security bulletins were released this week. Compared to 106 bulletins in 2013, six seems fewer but still enough to keep IT admins on their toes.

Just as everyone was preparing for a Fourth of July barbecue, Microsoft was busy on their end preparing for the release of advance notification for Patch Tuesday next week. Six security bulletins, two Critical, three Important, and one Moderate, were publicized. Compared to 106 bulletins in 2013, six seems fewer but still enough to keep IT...

avatar
Duleep Pillai
July 8, 2014
Discover More
If you operate with an iPhone or Android phone, you might be in for a security struggle if your device is lost or stolen

iOS 8 Will Alleviate HIPAA Security Risk

iOS 8 uses randomized MAC address broadcasts securing the user’s privacy. But before iOS 8 is out, MAC address broadcasts are still a threat to privacy security.  Mobile MAC (Media Access Control) address signal gives us updated, unencrypted, presence and location from our mobile phones and gadgets. Today, it is possible to keep track of...

avatar
Duleep Pillai
July 1, 2014
Discover More
If you operate with an iPhone or Android phone, you might be in for a security struggle if your device is lost or stolen

Devices such as smartphones and tablets have become major players in healthcare organizations. The integration of BYOD has changed the way we work, from standard uniform platforms to a more evolved, proactive route.

BYOD: Bring Your Own Device to Work Devices such as smartphones and tablets have become major players in the workplace particularly in healthcare organizations. The integration of medical applications has changed the way we work, from standard uniform platforms to a more evolved, proactive route. The challenge of incorporating personal devices to the workplace, BYOD...

avatar
Duleep Pillai
June 27, 2014
Discover More