3 Ways to Attempt BYOD and IoT Security

A decade ago, when smartphones started to penetrate the corporate world, IT managers had to consider the implications of Bring Your Own Device (BYOD) for their organization’s security. Now the proliferation of the Internet of Things (IoT) or connected devices has added an additional layer of complexity. Organizations are trying to keep pace with the […]

Posted in Blog | Tagged , , , , , , , , | Comments Off on 3 Ways to Attempt BYOD and IoT Security

Illinois Election System Breached

This election cycle has provided more than a few noteworthy headlines. Some of the most recent, however, don’t comment on the candidates, but rather provide a real-life lesson in cybersecurity preparedness. State and federal officials confirmed that Illinois’ state voter system had been breached earlier this year. Worse still, the Prairie State wasn’t the only […]

Posted in Blog | Tagged , , , , , , | Comments Off on Illinois Election System Breached