As federal agencies and local law enforcement continue to use facial recognition to probe for potential suspects it is also considered to be an invasion of […]
A voice phishing (vishing) scam that targets employees working from home is making the rounds. Learn how this scam works and what your company can do […]
By far, the two most popular smartphone platforms available on the market today are Apple’s iOS and Google’s Android operating systems. iOS, of course, only works […]
Many contact-tracing apps have popped up since the Coronavirus Disease 2019 (COVID-19) pandemic began. Discover how their technologies influence how they operate.
Network infrastructures are getting more complex and thus harder to secure with traditional network security tools. Fortunately, there’s a viable alternative: the zero trust model. Here […]
Just like with face-to-face meetings, virtual meetings need to be well planned and executed to maximize their usefulness. Here are five ways you can make your […]