Be Aware
The Privoro blog features our thoughts on mobile security, company updates and more.
Our product demonstration calls cover the following:
- Understanding your secure mobility needs
- Privoro solution certifications and approvals, and current customers
- Implementation requirements for onboarding the Privoro solution
- A demonstration of SafeCase protections
Smartphones becoming hackers' favorite target.
Our world is filled with news and conversations about hacking. From well-publicized public hacks...
3 minute read
Mobile Security,
Smartphone Vulnerabilities,
Smartphone Security,
SCIF Security,
SCIF Spaces,
Secure Spaces,
Government
Pentagon smartphone security policy.
Pentagon’s smartphone policy costs taxpayers an estimated $2 million per day
2 minute read
Why you’ll pay for digital privacy in 2019.
Current State Everything we do, everywhere we go, a data trail is following us, recording our...
3 minute read
Mobile Security,
Mobile Espionage,
Data Privacy,
Cybersecurity,
Smartphone Security,
Corporate Espionage,
Enterprise
Corporate espionage has gone mobile and gotten personal.
Economic espionage – also known as industrial espionage, corporate espionage and corporate spying...
4 minute read
Privoro says RIP to passwords and hello to better security on #PasswordDay.
As the internet uses #PasswordDay to celebrate and patronize the 1961 Massachusetts Institute of...
4 minute read
Blocking smartphone cameras is easy. Protecting microphones is hard. Here’s why.
Over the last couple of years I’ve become much more security- and privacy-focused. Why?
4 minute read
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Computer Security,
Smartphone Security,
Cyber Hygiene
Cybersecurity tips. Part 3: Digital hygiene.
This is the third installment of a three-part series on cybersecurity advice. In part 1, I covered...
5 minute read
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Computer Security,
Smartphone Security,
Online Behavior
Cybersecurity tips. Part 2: Online behavior.
This is the second portion of a three-part series on Cybersecurity advice. In Part 1, I covered...
4 minute read
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Computer Security,
Smartphone Security
Cybersecurity tips. Part 1: Awareness.
When I started my career over 20 years ago, I was issued a corporate laptop with a phone-line...
4 minute read