It’s a proven formula for business success: KISS. Keep it simple, stupid! If you can keep your operations simple then you can reduce the costs of doing business, ensure staff are informed and on top of everything and limit the possibilities of error. For most...
In Europe, there’s a lot of discussion about whether or not citizens have the right to be forgotten, or rather, be forgotten by search engines. According to a May 2014 ruling, search engines must consider requests from the public for removal of content. Not just...
In 2014 Community Health Systems, a huge hospital network, became the victim of a Chinese hacker group. The data breach occurred in 206 facilities across the U.S. and involved 4.5 million records, including Social Security numbers, birthdays, names, addresses. Nobody...
USB devices are a widely used item in the world of technology. Unfortunately they are notoriously vulnerable to exploitation by hackers and malware. As malware grows more and more sophisticated, you can no longer trust simple antivirus scans to protect your business....
Apple’s iOS operating system is known for its impressive security features, but that doesn’t mean it is invulnerable to all threats. Backdoors have been located in the operating system allowing Apple and law enforcement agencies like the NSA to access the...