Todd O’Boyle

Part 2: Strategies for Securing Mobile Devices in a Cloud-based World

By Todd O’Boyle | April 13, 2017

Part 2: Strategies for Securing Mobile Devices With workplace mobility now a way of life and companies investing in cloud-based apps more than ever, security is moving beyond the four walls. Just a few years ago, you could rely on

Part 1 – How Cloud Apps Are Making Businesses More (and Less) Secure

By Todd O’Boyle | April 4, 2017

Cloud Apps Security Today, more than ever before, employees are working while on-the-go. The ease with which a worker can enjoy a coffee-café latte in one hand and click “send” with the other is made possible by the explosion of

Cyber Criminals Are Business People Too

By Todd O’Boyle | December 13, 2016

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just

POPULAR

Opportunities and Pitfalls When Hiring a Chief Data Officer

Opportunities and Pitfalls When Hiring a Chief Data Officer

The Chief Data Officer As part of their digital roadmap, organizations are increasingly taking advantage of big data and making ...
Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah...the sweet smell of Virtual Immersion Success! Virtual ...
3 Major Concerns For Cloud Computing In 2017

3 Major Concerns For Cloud Computing In 2017

Cloud Computing Concerns With the rise of cloud computing, different concerns about adopting the cloud have arisen over the years ...
The Non-Holiday-Specific Mall For Cloud Solutions

The Non-Holiday-Specific Mall For Cloud Solutions

Cloud Solutions Mall If a mall were dedicated to cloud and cloud solutions and that mall had an Easter Bunny ...
Cloud’s Mighty Role - Why Custom Development is the Next Big Thing (Again)

Cloud’s Mighty Role – Why Custom Development is the Next Big Thing (Again)

Custom Development is the Next Big Thing Today, software is playing a very important role in performing basic business processes ...
Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, ...
Safeguarding Data When Employees Leave The Company

Safeguarding Data When Employees Leave The Company

Safeguarding Data Employee turnover is unavoidable. According to CompData Consulting, the average employee turnover rate in 2015 in the US ...
State of the Cloud Report In 2017

State of the Cloud Report In 2017

Cloud Report 2017 As the definitive guide to the biggest trends in the cloud industry, this year’s “State of the ...
Data Breaches And Concerns Over Password Storing Methods

Data Breaches And Concerns Over Password Storing Methods

Data Breach Concerns Data breaches have been plentiful over the past few years, and companies have lost millions of dollars ...
Four Cloud Security Mega Trends

Four Cloud Security Mega Trends

Cloud Security Trends Last year was a big year for the cloud. Cloud adoption continued to grow at a rapid ...