Eight Steps to Secure Mobile Phones & Tablets
By Scott Aurnou While threats to smartphones and tablets are only increasing as hackers and cyber criminals get more creative, taking a few basic (and relatively easy) steps will go a long way towards...
View ArticleAnyone Can Use Your Phone or Tablet & View Your Files, Unless…
Computer Security Tip of the Week Scott Aurnou – If your mobile device is lost, stolen, or even ‘borrowed,’ anyone holding your smartphone or tablet can do whatever they want with it – including...
View ArticleWhat is Endpoint Security?
By Scott Aurnou Literally speaking, ‘endpoint security’ refers to protecting the various electronic devices that can connect to a computer network. Each device that can access a network creates a...
View Article9 Ways to Secure Your New Tablet (or Smartphone)
By Scott Aurnou Get a new smartphone or tablet? Awesome! Unfortunately, hackers, cyber criminals and real world thieves won’t wait for you to break it in before they start making trouble. In addition,...
View Article