security

Blog Filters

Showing 1-11 of 11 results

sortby_icon
down_icon
data phishing hacking online scam concept, with laptop and envelope hook

Step Up Security

Perhaps you’ve noticed it in your email inbox or text messages: there is a recent uptick in the number of attempts to gain private information that compromises your personal and financial security, as well as that of organizations and corporations. According to a recent report from Proofpoint, email-based phishing attempts became increasingly successful in 2021, […]

04 / 10 / 22

Laptop Ban Update

The Department of Homeland Security releases new air travel security regulations, but there’s no need to leave your laptop at home…yet.

07 / 01 / 17

Election Hack

With the presidential election only a few weeks away, questions swirl about the vulnerability of electronic voting machines. Today’s voting systems run the gamut from punch cards to touchscreens. This November, three-quarters of U.S. voters will cast a paper ballot, but the other 25% are triggering concern. As electronic voting machines get older and less […]

09 / 15 / 16

Beware Ransomware

While in the past ransomware primarily struck individuals, the latest victims are large, data-rich institutions like hospitals and government services.

04 / 13 / 16

Embracing Tech

Renters of all ages have rising expectations for technology features in their rentals. While splurging on gadgets would certainly catch your prospects’ attention, that approach isn’t the most budget-friendly. You’ll want features that offer the biggest bang for your buck! We’ve evaluated a few tech toys that combine resident appeal, utility, and longevity. USB Compatible […]

09 / 24 / 15

Yardi Store

Yardi announced today that it has completed an examination of its security and internal controls for 2014 and has received its final SSAE 16 SOC 1 Type 2 report for its Store Enterprise and Store Advantage applications. Formerly known as SAS 70, SOC 1 is published by the AICPA (American Institute of CPAs®) under the […]

03 / 24 / 15

Bitdefender BOX

As soon as the first smart home device launched, I’ve started wondering: who was going to put a leash on what we now call The Internet of Things. Surely all with an interest in this age of ultra-connectivity and smart devices have had at least one vision where all these things around us turned against […]

02 / 12 / 15

The New Black

The world is realizing more of the gadgetry from James Bond’s reality, and it’s about time. But we’re not talking about underwater jet packs or a BMW equipped with missiles. Secure phones that ensure secret-agent level privacy are in demand across consumer sectors. They’re even being made by military contractors. Boeing has unveiled a secure […]

05 / 29 / 14

Protecting Data

As the digital storehouse of sensitive data grows, the quest for secure authentication continues. Heartbleed jarred many of us. Data on our most popular (and presumably better protected) sites was exposed and, in some cases, compromised. The introduction of biometrics was a step in the right direction but Heartbleed reminded us that biometrics only protect […]

05 / 14 / 14

Averting Data Disaster

With an interest in marketing, job title based in IT, a strong grasp of social media and a passion for real-life residents, Bill Szczytko has earned a following as someone who can be counted on to deliver prescient insight about apartment management. His network of contacts in the industry is nationwide, and he effectively uses […]

04 / 30 / 14

The Kill Switch

Today’s smartphones hold more private data than a credit card. A credit card comes with a “kill switch” but your smartphone does not. If your credit card is stolen, you can have it disabled. Any access to your account using the old card number will be forbidden. Yet if your smartphone is stolen, you and […]

02 / 26 / 14