Data Protection In this column, we often discuss various means for businesses to protect their own assets. For small businesses especially, it might be easy to imagine assets only as tangible entities: money, employees, equipment and so forth. But what about...
With the presence of computers and smartphones reaching an all-time high in our society, it has never been easier to discreetly monitor a person’s activities without their knowledge. The question has evolved from “Is it possible to compromise a phone or computer with...
For Part 2 of our “human assets” series last month, we examined a few computers specifically designed for the elderly: specialized Linux machines that offered a few simple web apps with large print and a simplified user interface. While these machines can be useful...
Part 2 of a 2 Part Series It’s hard enough for the average user to stay safe online. For those who don’t fall into the tech-savvy demographic, it can become nightmarish. In this column, Part 2 of our series on protecting human assets in a technological world, we focus...
My client was in a panic. It was a Friday and I had just wrapped up a case when the phone rang. “I need to get my laptop back,” he said, conversational formalities left at a minimum. “It has everything. All my company files, all my passwords. Everything.” The man’s...