Data Encryption Tools For The Mobile Business Executive

Infographic depicting various devices using data encryption.

Data encryption is not one of the security options most companies think of providing for their senior executives who use, and travel, with laptops, netbooks and tablets so they can stay productive even when on the road. This is even more true of corporate executives who sometimes demand anytime, anywhere access to data residing on corporate servers.

While the big corporations can afford to spend millions of dollars on data protection hardware and software., the same cannot be said of executives in small and medium-sized organizations, especially when it comes to loss of personal information, including credit card data, patient records or other financial information, stored by the company.

Data breaches happen and information is lost every day due to small mistakes that could have been avoided by using data encryption technologies. For small businesses, these data loss events can be devastating. (more…)


Comments Off on Data Encryption Tools For The Mobile Business Executive

How To Fix “Checking Battery State” Error

We recently ran into a “checking battery state” error on a Zorin Linux v7 installation where the system just hung for a long time at the “checking battery state” stage when starting up. Zorin Linux is a very easy to use operating system, especially for those making the transition from a Windows environment. As it turned out, this wierd error was quite easy to rectify. (more…)


Comments Off on How To Fix “Checking Battery State” Error

How To Fix CentOS 6.4 Boot Hang After Upgrade

The Community Enterprise Operating System, commonly known as CentOS is a solid Linux Operating system similar to Red Hat Linux. We recently ran into a GUI boot problem after upgrading to CentOS 6.4 in a VirtualBox environment. Upon restarting after the upgrade, we noticed that during the boot process, the system showed either a blank screen or the CentOS progress bar for an extended period, almost one hour.

Apparently, the CentOS 6.4 upgrade broke X11 (the UNIX/Linux Graphical User Interface  or GUI). A few attempts at repairing the boot loader using the CentOS 6.4 installation disc did not help. (more…)



Mobile App Permissions: Are Users Really the Problem?

While there have been a lot of news-worthy events in the past couple of years involving corporate breaches, one thing has not changed. Users are still considered the greatest obstacle to information security. Whether it is phishing, opening infected attachments, or “just being stupid and lazy”.

Our focus in this article will be on the “stupid and lazy” part of this equation. We will take a quick look at the way users tackle mobile app permissions in the android market place otherwise known as Google Play. A cursory look at some apps on Google Play and the permissions required by these apps, and the ratings given by users, even to apps with seemingly over-reaching or meaningless permissions, explains a lot about why security will continue to be a problem for a very long time. (more…)


Comments Off on Mobile App Permissions: Are Users Really the Problem?