Severe weather can be as devastating to your IT environment as cyberattacks. While you cannot prevent or stop events like tornados and hurricanes, you can prepare for them. With the correct preparations, you can minimize the damage to your IT systems and lessen downtime if disaster strikes. Here are five ways you can prepare your…
The touchscreens on smartphones, tablets, and other mobile devices are made to be touched, so getting fingerprints, smudges, and other types of dirt on them is inevitable, but it is important to not let this dirt accumulate over time. Build up can interfere with a screen’s touch sensitivity as well as make it harder for…
You are probably familiar with how cybercriminals use phishing and other types of attacks to obtain employees’ passwords, as this is often discussed in the media. But do you know what happens after a hacker steals an employee’s password? To answer this question, researchers at the security firm Bitglass conducted aneye-opening experiment. The Experiment The…