Public Wi-Fi is a convenience for the mobile workforce, but it's also a big risk. Here are some steps to protect yourself, your company if you have to use open Wi-Fi.
All in Best Practices
Public Wi-Fi is a convenience for the mobile workforce, but it's also a big risk. Here are some steps to protect yourself, your company if you have to use open Wi-Fi.
Improper disposal of electronics and peripherals is a global problem, contributing to a critical health crisis in the developing world, as children and families live and work in a synthetic soup of dangerous components. We can make a difference by disposing of computers properly.
Now that Internet Explorer has gone the way of Netscape and AOL, what will be the browser of the future? Are you ready to ditch your unsupported browser? You should be.
In the wake of the Paris attacks, many knee-jerk reactions involve giving law enforcement access through backdoors to all communications. That's wrong-headed. Those backdoors can be opened by anyone and make us less safe than we were.
Companies are becoming more and more focused on collecting, analyzing and informing decisions based on data. But they may be less diligent about protecting it. Shadow databases are a growing problem for businesses, resulting in anything from extra work, inaccurate databased information to data loss to hackers. Do you know where your data is?
iKettles all over London are boiling over with exposed home Wi-Fi passwords, thanks to "white hat" hackers who exposed the risks of this questionable convenience. Whatever your connected device, you have to be a smarter owner if you're going to have a smart home.
Shadow databases are risky business, but widely used. But well-meaning volunteers or hard-working employees may expose your business to unnecessary risk. Don't be one of the 60 percent of businesses that goes under after a data breach. This risk is avoidable.