The recent cyberattack on the Ukrainian power grid coupled with a ransomware attack targeted at the Israeli… / Read More
File sharing has become a key component of productivity across many industries and verticals – though it… / Read More
As discussed in our piece on legal security, law firms are under increasing scrutiny by both corporations… / Read More
Recently, a piece of iOS malware by the name of Keyraider stole the account information of over… / Read More
Last year, lawyers at a Chicago-based law firm and officials within the Indonesian government found themselves caught… / Read More
The conversation on mobile security is one that’s never going to end. There’s always going to be some new vulnerability in the press. It’s an unavoidable fact of life in enterprise. This situation isn’t helped along by the fact that most cloud storage solutions offer little in the way of security.
Two-factor authentication still offers superior protection for accounts, especially cloud services and personal e-mail used to transfer work files for access at home. There’s a more reliable way to offer two-factor authentication then one-time-password hardware tokens or text messages, though.