Karen A. Frenkel

How IT Teams Can Protect Health Care Data

By: Karen A. Frenkel

2 min read

Managing Mobility Is a Major IT Challenge

By: Karen A. Frenkel

3 min read

2016 Has the Markings of a Perfect Storm for Fraud

By: Karen A. Frenkel

3 min read

Can Two-Factor Authentication Fix Mobile Security?

By: Karen A. Frenkel

2 min read

Known and Unknown Malware Continues to Grow

By: Karen A. Frenkel

2 min read

Mobile Fraud Expected to Explode by 2017

By: Karen A. Frenkel

2 min read

Weak Mobile Security Poses Enterprise Threat

By: Karen A. Frenkel

2 min read

Wearables Will Increase Enterprise Risks

By: Karen A. Frenkel

3 min read

How Poor Communications Cost Firms Millions

By: Karen A. Frenkel

2 min read

Why Paying After a Ransomware Attack Is Futile

By: Karen A. Frenkel

3 min read

How Social Media Puts Businesses at Risk

By: Karen A. Frenkel

3 min read

Rapid App Development Creates Security Nightmare

By: Karen A. Frenkel

3 min read

Why Cyber-Criminals Target Android Devices

By: Karen A. Frenkel

2 min read

Mobile, IoT Face More Complex Attacks in 2015

By: Karen A. Frenkel

3 min read

How Missing Emails Can Cost Companies Millions

By: Karen A. Frenkel

2 min read

Best Practices for Social Media Archiving

By: Karen A. Frenkel

3 min read

Is It Time to Write Off Email?

By: Karen A. Frenkel

2 min read

How Analytics Helps Crime Fighters

By: Karen A. Frenkel

2 min read

8 Tips for Keeping the Business Secure and Productive

By: Karen A. Frenkel

3 min read

Workers Routinely Dodge Security Policies

By: Karen A. Frenkel

2 min read

1 2 3 4 5
...
15