Bring Your Own Device or BYOD policies are a great tools for employees and a money saver for companies, but it can also be a risky policy if not conducted properly. Mobile devices and a BYOD policy in the health care field can allow professionals to easily transition workflows, boost productivity and improve communication. The major issue with a BYOD policy in this field is the risk of security breaches leaking personal information and medical records of the patients. This is not only a concern … Read more
Pave the Way for a Successful BYOD Policy
Is your company currently allowing a Bring Your Own Device or BYOD policy for your employees, or considering starting one? While this strategy is a great way to promote productivity and save money for your business, you have to make sure you know the lay of the land before you start allowing a BYOD program at your office. Here are some helpful tips to ensure a BYOD policy is a success and not a regret: Decide On Your Devices Before you open up a BYOD policy, make sure you make it clear to your … Read more
Protect Yourself and Your Business Against Identity Theft
Identity theft can happen to anyone, at any time. It is a common crime in today's hyper-technology world. Hackers are coming up with new ways to steal your information at a rapid pace. You could be the average Joe on the street who accidentally gives your credit card information to a cloned PayPal, or someone steals your driver license's number and applies for credit cards under your name. Identity theft has become much more prevalent in the world than many would guess. Approximately 10 MILLION … Read more
Tips to Sink ATM Skimming
Today's world is far from the wild west, but bank robbers are still rampant and constantly after your money. The only difference is there tactics are far more technologically advanced. Criminals gain access to your bank account via ATM machines and some sneaky skimming of your money. These criminals use a combination of advanced card readers attached to the machine to capture your card information and small hidden cameras to snag your pin number. These cyber criminals then sell your … Read more
Do Not Use These Chrome Extensions
Do you use any of the following Chrome browser extensions? Change HTTP Request Header Nyoogle - (a custom logo for Google) Stickies - (a Post-It note for Chrome) Lite Bookmarks If so, you're not alone. These four extensions have a combined user base of more than half a million. Recently, security researchers from ICEBRG (a US cyber-security company) have discovered malicious codes embedded in copies of these on the official Chrome Web Store. The code allows hackers to … Read more
Backdoor In Certain Lenovo Switches Discovered
Does your company utilize either RackSwitch or BladeCenter networking switches? Are those switches running ENOS (the Enterprise Network Operating System)? If so, there's a backdoor in your network you weren't aware of. Even worse, it's been there since 2004. Engineers at Lenovo recently discovered the backdoor in the firmware when they conducted an internal security audit. These products were added to the company's portfolio via acquisition from Nortel, and Lenovo only just became aware … Read more
Vulnerabilities Found In Some GPS Services
A duo of researchers stumbled across a series of vulnerabilities in literally hundreds of GPS services that leave sensitive GPS tracking data open to hackers. Dubbed "Trackmageddon" by the researchers, the vulnerabilities span a range of weaknesses that include default or easy-to-guess passwords, IDOR (Insecure Direct Object Reference) issues, insecure API endpoints, and data collection folders that are entirely unsecured. The reason so many different tracking services are impacted is that … Read more
Electronic Device Search Rules Better Defined By US Customs
There's a constant tug of war playing out on the national stage. On one side, privacy advocates are pushing for greater autonomy for end users, and hard limits to the types of searches that law enforcement agencies are allowed to conduct. On the other side are the government agencies themselves, which often cite national security concerns as the justification for more and easier access to the sensitive data contained on personal devices like laptops and smartphones. Generally speaking, … Read more
New Wifi Standard WPA3 May Be Coming
Remember the KRACK WiFi (WPA2) vulnerability, discovered by Mathy Vanhoef? It turns out that his discovery was a catalyst for action. Recently, the WiFi Alliance, which is the industry's standards organization, released details about its new WPA3 protocol. Here's a quick rundown of the changes you can expect to see in the months ahead: Enhancements in encryption capabilities - The new protocol will enable encrypted connections between connected devices and the router/access point, and … Read more
Hard Drives May Double In Speed With New Technology
What's an HDD manufacturer to do when faced with competition by faster, more efficient SSD drives? Go big, and go faster. At least that's the strategy that both Seagate and Western Digital are adopting. SSDs tend to get prohibitively expensive as their size crosses the 1TB threshold, which creates an opportunity for HDD manufacturers. Seagate is currently selling drives with an impressive 14TB of capacity, and has plans on the drawing board to introduce a 40TB drive by 2023, with Western … Read more









