How can we make the online world safer for our kids and families? This episode, we learn how to strike a harmonious balance of online privacy and security with founder of the Family Online Safety Institute, Stephen Balkham. Tune in to hear his top tips for keeping our kids and families digital lives safe.
This is the third in a series of four posts about shadow IT, including how and why teams use unapproved apps and devices, and approaches for securely managing it. For a complete overview of the topics discussed in this series, download Managing the unmanageable: How shadow IT exists across every team – and how to wrangle it.
If you’ve ever used a password manager before—even the one built into your web browser—you can hit the ground running by importing all your existing items into 1Password.
How can we shape the future of AI and make sure it's used for good? We sit down with Verity Harding, author of the newly released: AI Needs You: How We Can Change AI's Future and Save Our Own. 🦸♂️🤖 Tune in for the historical lessons we can learn from previous tech revolutions of the twentieth-century – from the space race to the internet – and how they can empower us to join the conversation about AI and its possible futures.
This is the second in a series of four posts about shadow IT, including how and why teams use unapproved apps and devices, and approaches for securely managing it. For a complete overview of the topics discussed in this series, download Managing the unmanageable: How shadow IT exists across every team – and how to wrangle it.
This is the first in a series of four posts about shadow IT, including how and why teams use unapproved apps and devices, and approaches for securely managing it.
Joined by the popular Mac Admins podcast cast, we dive into Apple security and privacy, and how Macs are being integrated into workplaces everywhere. Find out whether an Apple product on its own keeps you secure and safe from viruses, or if you need additional security apps to protect your devices.