Email is an important and necessary part of your business or organization. It provides an economical and instant means of communicating with staff, customers, and vendors - that's both simple to use and enables increased efficiency. An email policy is required to protect this necessary business tool. An email policy is a legal document that details your organization's definition of acceptable use for the company email system. It should indicate who emails can be received from or sent to, as well as outline what constitutes appropriate content for work emails.…
While there have been a lot of news-worthy events in the past couple of years involving corporate breaches, one thing has not changed. Users are still considered the greatest obstacle to information security. Whether it is phishing, opening infected attachments, or “just being stupid and lazy”.
Our focus in this article will be on the “stupid and lazy” part of this equation. We will take a quick look at the way users tackle mobile app permissions in the android market place otherwise known as Google Play. A cursory look at some apps on Google Play and the permissions required by these apps, and the ratings given by users, even to apps with seemingly over-reaching or meaningless permissions, explains a lot about why security will continue to be a problem for a very long time. (more…)
Is it just me or are mobile phone carriers being forced by Google to remove the local synchronization options from their offerings of Android devices? It seems that it is a lot more work syncing Android devices these days.
I have always used Nokia phones and that manufacturer provided the option to sync the data on the device with a local computer – laptop, netbook etc. Recent trends with Android devices are becoming troubling. (more…)
It appears that the draw of the almighty dollar has pulled CNET to the dark side. CNET is a popular technology news site with a download portal called Download.com where many users go to download software that are free, shareware and open source. The site built a reputation a while back as a dependable location for hosting software that was devoid of malicious content – trojan horses, adware, virus etc. (more…)