Be Aware
The Privoro blog features our thoughts on mobile security, company updates and more.
Our product demonstration calls cover the following:
- Understanding your secure mobility needs
- Privoro solution certifications and approvals, and current customers
- Implementation requirements for onboarding the Privoro solution
- A demonstration of SafeCase protections
Posts about
Mobile Security (4)
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Computer Security,
Smartphone Security,
Online Behavior
Cybersecurity tips. Part 2: Online behavior.
This is the second portion of a three-part series on Cybersecurity advice. In Part 1, I covered...
4 minute read
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Computer Security,
Smartphone Security
Cybersecurity tips. Part 1: Awareness.
When I started my career over 20 years ago, I was issued a corporate laptop with a phone-line...
4 minute read
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Mobile Tracking,
Data Privacy Day,
CFMA
Data Privacy Day 2018: How safe is your personal information?
Personally Identifiable Information, commonly referred to as PII, can be broadly defined as any...
3 minute read
Prevent apps from spying on your phone.
How many of us have shared secrets, disciplined our children, sought council on how to address a...
3 minute read
New Year resolutions for mobile security.
A Personal Perspective on Security Resolutions for 2018 It was our original intent to put together...
3 minute read
11 best practices for computer and smartphone security.
Computer Security Day. At last a social media holiday that offers an opportunity to take stock of...
2 minute read
4 things to learn from the smartphone security breaches in Mexico.
First, everyone is susceptible to and a potential target of mobile surveillance, including chidren.
3 minute read
Security tips for international travel.
Preparing for a business trip – international or domestic – used to be a fairly routine ritual. Not...
4 minute read
Mobile phone tracking: "I've got nothing to hide."
We hear this when we discuss the breaches to smartphones with people who are often not government...
2 minute read