Apple's eBay store is something of a mystery. Cheaper prices (mostly) on its refurbished hardware. Is there a story here? Inquiring minds want to know.
There are no sacred cows to someone who believes that consumer devices and self-service IT are the keystones of the new business model. IT Apologist Ken Hess takes on Consumerization and bring your own device.
Kenneth 'Ken' Hess is a full-time Windows and Linux system administrator with 20 years of experience with Mac, Linux, UNIX, and Windows systems in large multi-data center environments.
Consumers need to proceed with extra caution to avoid scams, viruses, social engineering attempts, privacy-leaking apps, and malicious software of every flavor. These guidelines will keep you on the straight and narrow.
Businesses need extreme security measures to combat extreme threats. Here are 10 best practices that provide defense against the majority of all security threats.
There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.
Outside of the IT department, most users think that viruses are the only threat to their computing equipment. Many believe that malware doesn't affect mobile devices at all. An educated user is a safer user.
In a mobile security challenged world, Blackberry 10 might be just the ticket we've all been waiting for. Could it be that RIM is back in the game? Could be.
If you're going to allow users to bring their own devices, find out what you can do to maintain security and be a happier you. These ten security recommendations will help you do both.
Android's overwhelming popularity may be its undoing. Malware against Android exceeds threats against Windows. The threats are bigger and more is at stake than ever before.
To how many social networks do you belong? How valuable are they to you? If they went away tomorrow, would you feel any impact to your business? Good questions to ask yourself.
With user devices facing security threats from every direction and with no end in sight, BYOD should slow down a bit. The real question is, "What's the answer to this ongoing threat?" The answer may surprise you.