4 smartphone apps that make BYOD work

By Diana Zelikman, Fueled To the chagrin of some security conscious IT administrators, more and more employees are bringing their own smartphones and tablets into the office. This generally wouldn't be a concern

Share on LinkedIn Comment on this article Share with Google+ Published on: March 21st, 2014 Fueled

Windows XP end of support – Mitigating the security concerns

Only a few more days now, and Windows XP will officially be end of life.  April 8, 2014 will be the last day that Windows XP or Office 2003 receive any bug fixes

Share on LinkedIn Comment on this article Share with Google+ Published on: March 19th, 2014 Brian Bourne

3 experts to follow on Twitter for #FollowFriday

Twitter without tweets from these individuals would not be the same. They are people who tweet about innovation, security and tech trends, tweeps who keep us updated with the latest developments. breaking: Many

Share on LinkedIn Comment on this article Share with Google+ Published on: March 6th, 2014 Wolston Lobo

HootSuite enters managed services with Security & Compliance

Vancouver-based social media dashboard firm HootSuite Media Inc. is expanding its business today with a new managed service aimed at managing the risk that comes with a growing corporate presence on social media.

Share on LinkedIn Comment on this article Share with Google+ Published on: February 26th, 2014 Brian Jackson

HP adds ProPad, ElitePad 1000 to commercial tablet portfolio

Hewlett Packard Co. kicked off its participation in Barcelona's Mobile World Congress today by announcing two new commercial tablets to its product portfolio. The premium tablet and an update to last year's ElitePad

Share on LinkedIn Comment on this article Share with Google+ Published on: February 23rd, 2014 Brian Jackson

Samsung gets into server-less printing for SMB

While Samsung Electronics was hobnobbing with the celebrities and fashion icons at the Mercedes-Benz Fashion Week show in New York City, the company announced availability of its BusinessCore Printing Solutions for small and medium sized businesses. This program is

Share on LinkedIn Comment on this article Share with Google+ Published on: February 5th, 2014 ITBusiness Staff

The 6 most effective security measures for retailers

Data breaches are in the news in full force so far in 2014. First there was the colossal Target security breach that compromised over 100 million customer accounts and may yet impact hundreds of

Share on LinkedIn Comment on this article Share with Google+ Published on: February 5th, 2014 Claudiu Popa

Fortinet’s new FG 280 POE handles security for smaller networks

Cozumel, Mexico – High-end network security solutions firm Fortinet Inc. is going after the smaller network operations and the SMB space with some of its latest appliance releases. The foundation of the company’s

Share on LinkedIn Comment on this article Share with Google+ Published on: January 13th, 2014 Nestor Arellano

Millions of Target customers should expect a surprise in their inboxes

What was already a catastrophically large security breach became ridiculously monumental today as Target notified the public that an additional 30 million customers have been added to the previous total of 40 million

Share on LinkedIn Comment on this article Share with Google+ Published on: January 10th, 2014 Claudiu Popa

Adobe Creative Cloud: 2013’s Most Undervalued Business Tool for Startups

Since 1985, Adobe has been bringing the world innovative software solutions, including 17 generations of Adobe Illustrator. This year, they shook things up with Adobe Creative Cloud, and it has been a year

Share on LinkedIn Comment on this article Share with Google+ Published on: December 24th, 2013 Ashley Huffman

BLG points to tech issues as top business risks for 2014

Canada's business landscape is a relatively stable one and a good place to operate in for 2014, Borden Ladner Gervais says, but there will be growing areas of risk that organizations must be

Share on LinkedIn Comment on this article Share with Google+ Published on: December 16th, 2013 Brian Jackson

Can a computer ever be secure enough for Grandma?

Has this ever happened to you? No matter where you are in your career, you still get unscheduled support calls from your mom, asking for help with her latest computer gremlin. I'm sure

Share on LinkedIn Comment on this article Share with Google+ Published on: December 16th, 2013 Claudiu Popa

Major tech brands form coalition in response to PRISM leaks

In the wake of government surveillance programs leaked by National Securities Agency (NSA) contractor Edward Snowden, major tech industry firms are forming a coalition and calling on governments worldwide - starting with the

Share on LinkedIn Comment on this article Share with Google+ Published on: December 9th, 2013 Brian Jackson

Michael Geist on how the ‘Snowden fallout’ impacts business

The world is still reeling after National Security Agency (NSA) contractor Edward Snowden leaked classified documents to The Guardian newspaper. Those documents detailed the level of surveillance the NSA is engaging in on

Share on LinkedIn Comment on this article Share with Google+ Published on: November 29th, 2013 Brian Jackson