- There are privacy and security risks involved in connecting to public or 'free' Wi-fi hotspots. Here's a 4-step guide to setting up a virtual private network (VPN) for the times when you have to connect to unfamiliar networks.Don't assume that iOS is safe from malware and attacks. Previous incidents have proven that it's not as safe as you thought. Here are a few ways to tighten up security on your iOS device.How can you secure your Android device? Here are simple security tweaks you can do right now to make sure that your device—and the data in it—is protected:As the BYOD trend continues to grow, people are becoming more familiar with apps that can sync, store, and save data. IT admins need to flex their consumerization strategy to cover security for both company-issued and employee-owned devices.BYOD is widely accepted because of the significant cost reduction that it brings. Unfortunately, it also has downsides, the biggest of which are the security risks business-critical information is exposed to.Are you a digital hoarder? Unnecessary files can strain on your computer’s memory. But there are ways to rid your life of digital clutter. You can start by taking account of those things you use to access and exchange digital information.If you think how you’re using your mobile device is secure enough, you may want to reconsider. You may be guilty of doing things that are jeopardizing your own security every time you're on your tablet or smartphone.What you need to know about mobile privacy, and what you need to do to prevent cybercriminals from getting to the files and information on your mobile device.Looking into changing IT environments? Security experts warn that adopting new device types and computing platforms without proper control comes with a price.