10-Time Microsoft MVP Brien Posey Discusses the Use of Virtual Desktops as a Data Access Security Solution
Using Virtual Desktops as a Data Access Security Solution
— Brought to you by 2X Cloud Computing guest blogger Brien M. Posey —
In the not too distant past, the general assumption was that most corporate applications would be accessed from within the network perimeter. Today this simply...
BYOD Security (Bring Your Own Device), often referred to as BYOT (Bring Your Own Technology), is a security policy that permits workers to use their own equipment, like computers, tablet devices, or smartphones, while at work to access proprietary data and company-owned...
iPhone Security Vulnerability
You may have heard the news last month regarding an iPhone security exploit on the new iOS 6.1. The iPhone security glitch made it possible to bypass the iPhone’s passcode security and access to your locked iPhone’s contacts, voicemails, photos and more. Apple have said they are aware...
Dealing with Mobile Security Concerns
According to a survey concluded at the end of 2012, the top security concern worldwide across all sized businesses is mobile security. It’s no surprise – the use of mobile devices is rising, and most businesses are embracing the many advantages they bring. BYOD programs are increasing, and...
Don’t Overlook Android Tablet Security
Most people recognize the importance of securing their desktop computer against viruses or spyware. Now that tablets can do almost everything a computer can, people now need to take care of Android tablet security as well. After all, not only is there the usual risk of malware infected apps, there...
Microsoft Security Bulletin – Remote Desktop Vulnerabilities Could Allow Remote Code Execution
Microsoft have released a Security Bulletin (MS12-020) outlining some vulnerabilities in Microsoft’s RDP protocol implementation.
These vulnerabilities are important to take into consideration when using 2X Remote Application Server since connectivity can be established using the Microsoft RDP...
2X Remote Application Server Taking Network Security to the Next Level!
At 2X, our main concern is making your environment secure, reliable, and free from nonsense glitches in the daily running of your network, whenever possible. We constantly work hard to improve our products and make them even faster, reliable, and easy to use. In this article, we will take a look at...
Why is Mobile Phone Security Important?
Mobile phones are here to stay and you need to know how to protect your privacy when using them. Many people have come to accept security on their computers as the norm yet still overlook mobile phone security. This is a mistake.
Hackers are taking advantage of this lack of security awareness and...