Minimizing the Risks of a Lost Phone
If you’ve ever lost your phone or had it stolen, you know the feeling of panic that comes with it. Read More
If you’ve ever lost your phone or had it stolen, you know the feeling of panic that comes with it. Read More
Yes. If you don't pay attention to the permissions, you may give apps access to more information than you'd like. Read More
A data breach is a security violation in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an unauthorized individual. It could be a result of
Read MoreSometimes. Currently, no federal law gives you the right to prevent data brokers from collecting, sharing or publishing your personal information. Read More
MDM software allows employers to have varying degrees of control over devices (like phones and tablets) that their employees use for work purposes. Read More
While it’s impossible to entirely rid your life of spam, you can take action to significantly reduce the amount you receive.
Read MorePasswords can be your first line of defense against stolen personal information (phone data, banking information, email, medical records) so it’s important to create one that is strong.
Read MoreIn 1973 the U.S. Dept of Health Education and Welfare (HEW) to look at the impact of computerization on medical records privacy. The members wanted to develop policies that would allow the benefits of computerization to go forward, but at the same time provide safeguards for personal privacy.
Read More