This week we're looking at new threats and security changes that could soon become day-to-day issues!
Have you ever considered asking students in your campus to leave their mobile device at home? Exactly. The answer would be quizzical looks and a resounding “no!”
Mobility is just part of everyday life for the vast majority university students, like electricity or tap water. They come to campus with mobile phones, laptops, consoles, and wearables without many concerns about securing their devices or protecting campus networks.
A week of warnings! This time we have a recap full of flaws, exploits, and malware, so keep your eyes open and see what could affect your network.
Back in August, we wrote about the future having arrived for the Internet of Things (IoT), exploring Three key IoT trends to keep your eye on in 2017. As we noted then, the industrial sector leads when it comes to the development of IoT solutions, but new industries are starting to catch up...
Vendors like Amazon, Apple, and Google are leading the charge in bringing millions of new home devices online to join the billions of intelligent IoT solutions. These devices are spreading into people's homes and into new industries, which are discover multiple new applications for these devices.
Businesses and consumers need to understand how IoT impacts their own products and solutions and to explore how IoT devices can be deployed to help with their day-to-day business. Yet with so much progress, it’s become harder to cut through the noise to identify and understand the innovations that matter, or the new applications of IoT that we can learn from.
Take a quick glance around your office, and you may quickly note that several of your company's employees are now sporting wearables, which most often come in the form of fitness trackers. You might even own one!
In 2015, eMarketer projected that, by 2019, two out of five people will use a wearable. And thanks to an abundance of anecdotal evidence, that number checks out.
This week we steer clear from this year's tendencies and we start to look into new flaws and targets!
It is so much easier to fear the enemy—intentional or accidental—outside the gates than those which stand within them.
Unfortunately, it seems that many of today's CTOs, as well as business owners themselves, do in fact feel far warier of the risky behaviors—and sometimes flat out bad intentions—within their organization than they feel regarding anonymous hackers and other cyber-criminals when it comes to mobile security.
As a user-generated movement, Bring Your Own Device (BYOD) is clearly unstoppable. Every study and poll out there show an inexorable, growing adoption curve that shows no sign of slowing down.
BYOD sure does offer cost savings to enterprises. However, it also poses important security risks if the right precautions aren't taken. If you haven’t done so yet, the time has come to regulate this BYOD business in your, er, business.
Triple user-requested features coming through! We're updating some of Prey's features with feedback from you guys, see what's new.
New day of the week for GOT(IT), but this year's security topics still feel like a spy vs spy strip!