Shadow-IT: Employees putting Business at Risk

Shadow-IT: Employees putting Business at Risk

Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession.  And they carry them everywhere. Yes, I am talking about their cellphones.  On these devices, they can download 1000’s of apps. These apps allow them to create...

A Lesson to Learn – If it is Connected It can Be Hacked

A Lesson to Learn – If it is Connected It can Be Hacked I remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product...