Search Results for
BEC
Which chat service should your business use? Different messaging services go head-to-head
Instant messaging services have become an essential part of our lives. Not only do we constantly use them to keep in touch with friends and…
Back to school without any nasty surprises: security advice for your child’s cellphone or tablet
When September rolls around the focus of all parents, many just back from holidays, inevitably reverts to getting their littles ones prepared for the new…
Is there for a future for traditional text passwords?
“It doesn’t matter how complex or unique they are, your passwords can no longer protect you” (Matt Honan, Wired) It is relatively easy to find…
The most sought-after professional profiles in the information security sector
Direct attacks, identity and information theft of all sorts (especially social engineering), persistent advanced threats… the risks associated with information security are continually multiplying in…
Six challenges for the Chief Information Security Officer
The increasingly complex landscape that society’s mass digitization has established, driven by mobility and permanent connectivity, coupled with the new risks and threats that are…
Buying smartwatches – The latest craze that’s also a security risk
This is the latest must-have in mobile devices and the more its popularity increases, the more our confidential information is at risk – as they…
Panda Security makes your digital life easier and safer thanks to its new multi-device solutions
The new range of 2016 Consumer Solutions from Panda Security is now available. Panda Gold Security 2016, Panda Global Protection 2016, Panda Internet Security 2016,…