With constant technological evolution making it increasingly challenging to keep prying hands and eyes out of one’s online business, it is hardly surprising that the race towards VPN software has mounted up over the years. This works just as well for marketers as the market has witnessed an influx of VPN apps, all claiming the […]
Thanks to the prevalence of bring-your-own-device programs and increasing reliance on mobile work, the need for high-quality mobile device management is higher than ever. To meet this demand, company leaders must understand what comprises a good Mobile Device Management (MDM) strategy and a 4-step guide to mobile device management — how to implement one effectively. Today’s […]
The transition into the era of electronic health records and health wearables has resulted in a plethora of electronic patient information including dates of birth, home addresses, social security records, insurance details and medical data. This data is highly desirable on the black market. But there are ways to prevent the risk for fraud. I recently […]
The app collects enough info to pinpoint user locations, though it says it doesn’t use it.
It can check out any time you want, but it can never leave.
It would include a 30-day clock for reporting data breaches
We find your lack of transparency … disturbing.
The lure of mining your data is too much to resist.
Symantec researchers sound the alarm.
Travis Kalanick has some ‘splainin to do.
End-to-end encryption protects messages from snooping.
It’s not privacy users value most, said CEO
One word: Ads.
It’s easy, but not exactly obvious.
A Guardian report ignites a privacy firestorm.
Hard to use, and unencrypted too!
A startup raised money. Shocking, we know.
Digital property is property too.
Here’s how to prevent it.