Category Archives: iPad Security

Hacker typing on a laptop

3 Examples of Major Data Breaches and How Your IT Company Can Avoid Falling Victim

SPONSORED POST

Hacker typing on a laptop

Even though the internet has done a tremendous job with linking many people together, there are also many different things that you also need to think about as well. Just like how roads made travel easier for people hundreds of years ago but then also brought forth enemies on those very roads, you have to be aware of the problems that can come when you transfer more of your information and data online. A few of the major data breaches that have occurred recently should show exactly what you should and what you should not be doing to protect your organization from being next on the list.

Continue reading

Share This:

The predicament of managing digital assets after death

Apple-ID-Sign-in

Apple was in the news in a big way last week surrounding a highly publicized media storm regarding a widow’s attempt to access an iPad belonging to her deceased husband. Access to digital assets after the death of a loved one has been a contentious topic for years. Wth the rapid growth of Cloud computing and storage, the problem will continue to present challenges for all those involved.  Unfortunately, we won’t see a solution until there exists a formal policy addressing  how to handle what many see as a no brainer.

Continue reading

Share This:

How does Apple protect your individual privacy on your iPad?

iPad-passcode-security

Security and privacy go hand-in-hand.  However, Apple is a firm believer that security shouldn’t come at the expense of individual privacy–and this is a _very_ good thing for us.  But what does that really mean for the average consumer, and what is Apple really doing with all of our data?

Luckily for us, Apple has been on the front lines, carrying the torch when it comes to privacy. They’re often touted for their strong stance on consumer rights and privacy, as well as their own transparency on the subject.  The Electronic Frontier Foundation (EFF) recently awarded Apple their highest ranking in their latest “Who Has Your Back?” report–giving them 5/5 stars .

What is Apple’s policy regarding requests for information?

How does Apple handle requests from law enforcement officials for information about customers and their Apple devices?

  • All requests are required to be accompanied by a subpoena or search warrant.
  • Each request is carefully reviewed to ensure that there’s a valid legal basis for it.
  • Apple’s response is limited to only the data law enforcement is legally entitled to for the specific investigation.
  • Apple does not work with _any_ government agency from any country to create a “backdoor” in any of our products or services.
  • They have never allowed any government access to their servers.

Continue reading

Share This: