Cyber Security

How healthcare innovations can help keep prescription drug information confidential

By Jennifer Goforth Gregory | Healthcare

There are a number of healthcare innovations and strategies that enterprises can leverage to minimize breaches and ensure patient confidentiality. Read More

By Jennifer Goforth Gregory | Healthcare
B2B Content Marketing Writer

December 21, 2016

How to create a BYOD program that addresses healthcare industry needs

By Elisa SilvermanHealthcare

Hospitals and practices need a BYOD program to manage compatibility, security and compliance issues. Read More

By Elisa SilvermanHealthcare
Technology Writer

December 12, 2016

Electronic patient data drives healthcare security concerns

By Crystal BedellHealthcare

The increasing use of digital technologies has transformed the way healthcare security operates. Here are some top concerns to protect yourself against. Read More

By Crystal BedellHealthcare
Principal, Bedell Communications

November 24, 2016

Wearable technology security concerns enterprises as popularity grows

By Scott Steinberg

With wearables growing in popularity, wearable technology security is necessary for the enterprise. Read More

By Scott Steinberg
Keynote Speaker and Bestselling Author

November 22, 2016

6 most common types of cybercrimes business leaders should understand

By Scott Steinberg

Unfortunately for business leaders, cybercrimes are on the rise and may cost businesses more than $2 trillion by 2019. Here's what you need to know. Read More

By Scott Steinberg
Keynote Speaker and Bestselling Author

November 18, 2016

Enterprise device management: 4 key success principles

By Jonathan Hassell

Here are four ways IT senior management can successfully conduct enterprise device management within their organization. Read More

By Jonathan Hassell
President, 82 Ventures

November 11, 2016

Mobile technology can improve voting data, but security concerns remain

By Todd Wasserman

Voting data could go mobile — but not this year and not anytime soon. Concerns remain over the security of this type of technology. Read More

By Todd Wasserman
Technology Journalist

November 8, 2016

How cybercriminals are stealing and manipulating mobile data

By Karin KelleyHealthcare

Hackers are not only trying to steal your mobile data, they're trying to alter it for malicious purposes, and mobility is only widening the attack. Read More

By Karin KelleyHealthcare
Independent Analyst & Writer

November 1, 2016

Take action on these top 10 mobile application vulnerabilities now

By Patrick Fan

With the unique nature of mobile device and usage, there are some mobile application vulnerabilities that are not seen in traditional applications. Read More

By Patrick Fan
CEO / Founder of beNovelty

October 11, 2016

Load More
Newsletter Signup
MobilePhobia

Ten Rules For BYOD

Twitter