Author Archive

No business IT specialist who treats their job seriously would hand a computer to an employee without locking it down first. It would come with a login enabled, antivirus software and firewalls installed, any company exclusive security and more. All of this protects the user’s data from outside intrusion or access by unauthorized personnel. All of this is standard for any laptop or desktop computer issued to an employee. What about smartphones? Many companies allow their employees to use their iPhones or android devices for work, and some even issue the devices themselves. As these phones grow more popular, they become enticing targets for enterprising hackers and virus creators. It’s no surprise when employees can use these phones to read e-mail attachments, VPN into the

Read More...