How to Protect your Mobile Device20130430140640
How to Protect your Mobile Device
Tony Abou-AssalehApril 30, 2013android marketplace, iOS, iPhone, mobile device, mobile security, smart phone0 comments
We are all reliant on our smart phones. Whether your focus is on pleasure or business, it’s safe to say that your mobile device is never far from your...
How to Successfully Manage BYOD Security20130321105650
How to Successfully Manage BYOD Security
Tony Abou-AssalehMarch 21, 2013bring your own device, BYOD, Cloud security, computer world, mobile device0 comments
We’ve talked about Bring Your own Device (BYOD) on the blog before, and it’s still a topic that’s generating a lot of conversation. If managed success...
5 Things to Consider When Choosing a Secure File Sharing Provider20130220123828
5 Things to Consider When Choosing a Secure File Sharing Provider
Tony Abou-AssalehFebruary 20, 2013**, audit trail, collaboration, data breaches, encryption, mobile device, secure file sharing, security0 comments
Has your office been thinking about secure file sharing lately? Whether it’s because of the constant stream of news stories on data breaches, or...