COVID-19, referred to the Novel Coronavirus, is globally affected over 100,000 people direcly and millions indirectly. For years we’ve heard in Information Security that “the perimeter is dead,” but now is the time that we test it as some companies look at completely closing physical access to buildings at scale during the Movement Control Order. The IT perimeter definitely exists; we can point to firewalls and DMZs and a loose correlation in most companies between some types of digital assets and the physical boundaries of the company. But the believe that the perimeter can stop serious, advanced attacks has long […] Read more
Providing quality education for children and youth is one of the most important priorities of any society. Since information technology is spreading into every aspect of our lives with a lightning speed, it is only natural that educational institutions are willing to evolve and adapt their teaching methods to reach the modern standards and go beyond traditional ways of education.
It is proven that bringing mobile technology into a classroom improves learning efficiency, dramatically increases student engagement, makes the process easier, faster and more fun, promotes innovation and development and brings teaching experience to the next level. Tablets and smartphones are […] Read more
It is the rise of the mobile devices as the new exciting edge of everyday computing and has become an integral part of the business world. Today, old-school desktops and laptops are not the only devices used for work. Most companies now depend on the use of smartphones and tablets to handle day-to-day business tasks ranging from the critical to the routine.
But this mobile environment is generally unfavoured to grow and evolve without restriction. Businesses need to clear the blur lines between the personal and corporate use. Small or large businesses could even face security risks and other complications created […] Read more