By Erik Briceno

Smartphone Smarts: Know What Data You’re Sharing and How To Protect It

When it comes to cybersecurity, you may think you’re taking all the necessary steps to protect your critical information by building in safeguards that are an integral part of your IT network.

Rogue hackers, corporate saboteurs and internet vandals pose a clear and present danger to your company — which is why it’s essential to keep the doors to your computer systems locked.

But those same cybersecurity principles should apply to the smartphones — and the accompanying apps — your employees are using, which also contain vital business information.   Read more