<img src="https://secure.leadforensics.com/71120.png" style="display:none;">

Kalki Blog

Header_about.png

Want Apple to block your iPhone from recording video at gigs?

Posted by Vikas Bhatia on Jul 4, 2016 10:11:05 AM

Was your recent concert visit be annoyed by iPhones blocking the view?  Apple may have the answer to your problems!  Apple was awarded a US patent last week for a system could restrict your iPhone's ability to  capture videos at concert venues by deploying an infrared signal to block your phone from recording
video at concerts.

Read More

Topics: Mobile Devices, BYOD, Malware

5 Things you need to start doing today to keep your mobile device safe

Posted by StacyNease4Fbhds on Apr 21, 2015 6:33:12 PM

1. Update your software regularly

Read More

Topics: Mobile Devices, BYOD

Hijacking Vulnerability in Google’s Android OS

Posted by Kyle.Balicki on Mar 30, 2015 3:21:52 PM

A recently discovered vulnerability in Google’s Android OS can leave you open to an attack. This vulnerability allows an attacker to replace or change a typically safe Android application, infecting it with vicious malware during installation.

Read More

Topics: BYOD, Breach, Cyber security

Human Resources and Information Security

Posted by Stephen.Lawton on Oct 15, 2013 1:10:58 PM

Every company faces this dilemma at some point: an employee must be discharged from their job where they had access to confidential corporate data. The reasons are as varied as the people themselves. Perhaps the discharge is due to corporate downsizing. Maybe the company is changing its focus and the employee’s job has become obsolete. The worst scenario occurs when the company finds an employee doing something nefarious, such as stealing information or accessing confidential data to which they have no business responsibility, such as looking up the personal contact information for a client that the employee wants to date.

Read More

Topics: BYOD, Security Credentials, Risk assessment, small business, Human Resources, Psychology, Cyber security, Policies and Procedures