| |

Mobile Apps: How to Use Them Safely

The use of mobile applications (apps) is increasing in parallel with the increased use in mobile devices. According to Gartner, “Worldwide mobile application store revenue is projected to surpass $15.1 billion in 2011… and by 2014 over 185 billion applications will have been downloaded from mobile app stores.” The continued growth of mobile apps requires…

| | | |

Cyber Security Emerging Trends and Threats for 2012

During 2011, cyber security incidents included theft of intellectual property and government data, hacktivism, malware targeting mobile devices and a resurgence of the Zeus Trojan, which targets financial information. Protecting against these attacks was a key challenge for organizations of all sizes in both the public and private sectors. What is in store for 2012?…

|

Security of Mobile Communication Devices

From the Desk of Chad M.  Barr, CISSP, CISA All This Functionality in One Device! Mobile communication devices (includes Blackberrys, iPhones, smart phones in general) have become indispensable tools for today’s highly mobile society. Small and relatively inexpensive, these multifunction devices can be used not only for voice calls but also text messages, email, Internet…

|

Erasing Information and Disposal of Media

From the Desk of Chad M. Barr How can I be sure files are erased? Data can be stored electronically in multiple formats and locations. Data sometimes includes sensitive documents or possibly data containing personally identifiable information such as a social security number, credit card information, or health related information. For example, the initial information…