Smartphone hack could bypass passcodes

The  lines between old-fashioned hacking attacks and the kinds of high-tech, complicated code-cracking you might see in a “Mission Impossible” movie are starting to blur. And it’s a good reminder of why users should be practicing some basic rules on protecting smartphones. 

One basic security threat many organizations ignore

IT is understandably focused on beefing up technical security to protect against hackers and other online threats. But there”s another danger out there many businesses are failing to guard against: 

Beyond IT security: Protecting your company from all threats

IT puts a lot of effort into securing networks, servers, and users’ computers. But what about the bigger picture? Taking a look at physical security and focusing on different protective measures can help an organization cover all of its bases. 

FTC: Company kept too much data, failed to secure it

Allowing users to carry sensitive data on a portable computing device creates a certain amount of risk. But here’s a data breach that occurred because several pieces of IT equipment were stolen from an employee’s car. 

Where are laptops most often stolen?

One of the biggest security risks associated with traveling users is that their laptops, tablets and other mobile devices will be stolen. What are the most dangerous places to bring laptops? 

Thieves’ new target: Careless coffee shop customers

Next time you give a user a laptop, you may want to include a warning:

Top 3 mobile device dangers – and how to avoid them

The increased use of mobile computing devices creates a whole new set of security challenges for IT managers. Here are the top dangers, and how you can help minimize them: