Take a quick glance around your office, and you may quickly note that several of your company's employees are now sporting wearables, which most often come in the form of fitness trackers. You might even own one!
In 2015, eMarketer projected that, by 2019, two out of five people will use a wearable. And thanks to an abundance of anecdotal evidence, that number checks out.
This week we steer clear from this year's tendencies and we start to look into new flaws and targets!
It is so much easier to fear the enemy—intentional or accidental—outside the gates than those which stand within them.
Unfortunately, it seems that many of today's CTOs, as well as business owners themselves, do in fact feel far warier of the risky behaviors—and sometimes flat out bad intentions—within their organization than they feel regarding anonymous hackers and other cyber-criminals when it comes to mobile security.
As a user-generated movement, Bring Your Own Device (BYOD) is clearly unstoppable. Every study and poll out there show an inexorable, growing adoption curve that shows no sign of slowing down.
BYOD sure does offer cost savings to enterprises. However, it also poses important security risks if the right precautions aren't taken. If you haven’t done so yet, the time has come to regulate this BYOD business in your, er, business.
Triple user-requested features coming through! We're updating some of Prey's features with feedback from you guys, see what's new.
New day of the week for GOT(IT), but this year's security topics still feel like a spy vs spy strip!
Although it never really went away, BYOD is making a comeback of sorts in 2018. And, boy, do many US corporations –possibly including yours– have a lot to catch up on.
Learn how this University ensured a smooth digital environment by making device security part of their deployment protocols.
2018's top cyber-threat tendencies are living up to their name: state-sponsored attacks and cryptojacking continues on the rise