Half Sized Blog Element (Single Author Style)
Half Sized Blog Element (Multi Author Style)
IT Security Audits: A Necessary Evil…
As I prepare to conduct my next IT security audit at a client’s site, I realize some things have not changed in the past few years. The client’s reaction towards the security audit is always amazing the day before the on-site visit as they exhibit a sense of fear. For the most part, it has […]
iPad Security
Apple’s new iPad is set to be released on April 3rd and SecurityOrb.com a Washington D.C.-based information security media company has looked beyond the hype into the possible security matters consumers should be concerned about.
IT Security Audits: A Necessary Evil…
As I prepare to conduct my next IT security audit at a client’s site, I realize some things have not changed in the past few years. The client’s reaction towards the security audit is always amazing the day before the on-site visit as they exhibit a sense of fear. For the most part, it has […]
iPad Security
Apple’s new iPad is set to be released on April 3rd and SecurityOrb.com a Washington D.C.-based information security media company has looked beyond the hype into the possible security matters consumers should be concerned about.


experts feel the iPad will inherit many of the same security issues of the iPhone. For example, weakness in the encryption function and malicious software are major concerns. If the iPad were to use the same encryption as the iPhone, sensitive personal data would be at risk of being captured and viewed. Also, the iPad will be at risk of obtaining malicious apps from the Apple AppStore. The screening process for the applications on the AppStore isn’t always the best.