BYOD: Bring Your Own Device-Placing limits

BYOD: Bring Your Own Device-Placing limits

Our recent blog talked about the data security concerns that BYOD can bring to your workplace. However, there is another factor that needs consideration before adopting BYOD. How much Bring Your Own can your IT department support? Supporting too many different...
Multi-factor Authentication Demystified

Multi-factor Authentication Demystified

You have probably come across the term multi-factor authentication of late. It is an IT buzzword today and is fast becoming one of the best practices of cybersecurity. What is Multi-factor Authentication? As fancy as the term sounds, multi-factor authentication (MFA)...