Monthly Archives: September 2011
It’s never been so precarious out there in the big wide world of the web! The past few months have been a lesson for us all. So can we apply what we do in the physical world, to the virtual … Continue reading
Which is more secure: hardware or software authentication? And which should you choose to prevent becoming the next victim of a breach?
The recent events involving the mobile phone hacking actions of News of the World journalists — and quite possibly many others — have highlighted the fact that there are insecurities in the world of mobile telephones. And with approaching five … Continue reading
We all know that the value of our investments can go down, as well as up. But, there is a real risk that they could also go to someone else. Why? Well because you’ve been the victim of a breach.