


iOS 13 Safety Warnings for Apple Users
By: Clay Miller, CTO, SyncDog The iOS 13 rollout has been tough for everyone. It has been plagued from the start with bugs and security vulnerabilities. While it is easy to blame Apple for its lapses, the real question becomes whether or not we should rely on the...
Why BYOD is Making a Comeback in the Business World
SyncDog CRO Brian Egenrieder is a guest blogger for Symantec in their Expert Perspectives column. Here is a snippet of his most recent blog below: When it comes to planning out enterprise security in a world increasingly dominated by mobile-savvy employees, even...
Protecting Corporate Data: Password Strategies
By: Clay Miller, CTO, SyncDog With each passing headline that screams of yet another company hacked, municipality breached, and healthcare system network rendered inoperable, it has become evident to executive leaders that organizations’ data security is a...
Enterprise Data: How Vulnerable Is It?
Posted by Clay Miller, CTO, SyncDog There is an old adage that says “when the tide goes out, you find out who’s swimming naked.” As it turns out, enterprise mobile security has been a party at a nude beach and no one even read the sign. Unfortunately, a recent report...