If the world’s top authority on computer security leaves his personal network open, why should any of the rest of us worry?
The laptop in your bag is probably as secure as it can get, but the smartphone in your pocket is about as secure as your voicemail. The scariest thing? No one really seems to care.
Think the furor over WikiLeaks is dying down? Its just getting started, folks.
Just about any smartphone being managed by a corporate IT department can be wiped clean without user involvement.
We're not just business people or IT pros, many of us are parents, too. Is it good to use your tech savvy to establish an online presence for your child from birth? Or will it cost him or her in the long run?
No matter how diligent you are in hardware, policy-making, or hiring, your security is only as strong as the weakest link. Columnist Christopher Null examines the realities of insider fraud.
Social networks should not be taken lightly --n ot by your employees and not by you. Chris Null asks, "What impact might Facebook activity have on corporate endeavors?"
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?