Future of data storage

Data Cloud Storage mobile security

As cloud computing is gaining more and more popularity, people start asking themselves where it’s going. Its evolution has brought data centre and supporting technology to a whole new level. Cloud computing is not just a tendency any more. It has made it’s way from discovery to becoming an essential part of the business strategy of many organizations. And choosing the right approach means thinking about the future of this strategy. That’s why it’s important to know the advantages of the cloud platform models. Recently, the hybrid cloud environment has…

Read More

BYOD 101: How it Changed Businesses

BYOD or “bring your own device” entered the lexicon in the mid part of the first decade of the new century when it was mentioned in a paper by Ballegas et al at UBICOMP 2005. By 2009, the movement had gained some momentum as employees at Intel began bringing their own devices to work and use them to connect to the corporate network. By 2012, the United States Equal Opportunity Commission had adopted a BYOD policy. Despite this, many employees balked at the trend due to concerns about billing and…

Read More

How to Use Your Android Phone Safely

android smartphone market

Google’s Android operating system is more popular than ever. Unfortunately, Android’s open source architecture and substantial market share have made it a continuing target of malware attacks. According to a recent report by Trend Micro, 79% of all malware threats affect Android. In fact, they report that there have been over a million of these threats in the first nine months of 2013 alone. While some of the statistics may be alarming, there is no reason for Android users to give up their devices. By following some prudent steps, you…

Read More

NFC technology projects from HID Global reach conclusion

HID Global NFC technology projects come to an end at Netflix and Good Technology headquarters HID Global, a secure identity solutions developer, has announced the completion of two pilot projects concerning NFC technology. The pilot projects were meant to examine the capabilities of NFC technology in access management and whether the technology presented a significant risk for existing security systems. These projects were conducted in the headquarters of Good Technology and Netflix. Both companies made use of NFC-enabled mobile devices to participate in the pilot projects. NFC continues to grow…

Read More

Malicious QR codes growing – Consumers may need to take steps to protect themselves

QR Code Security

As QR codes continue to grow more popular with consumers, they are also growing more popular with hackers. The codes have become a very lucrative malicious tool for hackers looking to exploit their popularity. More codes are beginning to appear containing malicious content that can put a smart phone user’s important information at risk. The content embedded in QR codes is impossible to tell until after the codes are scanned. There are, however, some measures smart phone users can take to protect themselves. QR codes can only be scanned using…

Read More