Here's what you need to know about security choices before you upgrade your IT, We'll cover vulnerabilities - including software, network, multi-factor authentication, and ground-up hardware protection including BIOS protection.
In an increasingly online world of doing business, it’s human instinct to share information than to keep it secure. Reimagine safety and security to take your business further.
This article will outline ways we mix work and personal life - focused around device use. Examples: Watching Netflix on your work laptop, responding to work emails on the bus home, doing your online grocery shop between meetings.
This post examines what a flexible worker looks like: Flexible hours; compressed work schedule (4 long days); job share; two days at home; part-time, etc. Then we look at how flexibility changes the tools we use for work - eg Dropbox or Basecamp; Messaging like Slack or Jostle; WORKPLACE for Facebook.
This article shows different near-proximity hacks including visual, wifi hacking, "BlueBugging" and blue snarfing - with bluetooth. Examples could include - Coffee shop; Airport; Hotel Lobby; Train ; Internet Café