There are no sacred cows to someone who believes that consumer
devices and self-service IT are the keystones of the new business
model. IT Apologist Ken Hess takes on Consumerization and bring
your own device.
Ken Hess
Kenneth 'Ken' Hess is a full-time Windows and Linux system administrator with over 15 years of experience with Mac, Linux, UNIX, and Windows systems in large multi-data center environments.
Latest Posts
Are Apple's famous defectors going to have an impact on the popularity of iPhones?
What if someone famous switched from iPhone to Android? What about two famous people? Andy Ihnatko and Guy Kawasaki both have taken up residence with Android phones. What's the world coming to?
published 1 day ago by Ken Hess
36 Comments Vote
Building dependencies on free apps and services is bad practice
How many times have you seen free services disappear, switch to non-free, restrict you too much or have no value — even free of charge? I've seen it more than I want to admit to.
published 1 day ago by Ken Hess
12 Comments Vote
What's up with Apple's down low on eBay sales?
Apple's eBay store is something of a mystery. Cheaper prices (mostly) on its refurbished hardware. Is there a story here? Inquiring minds want to know.
March 8, 2013 by Ken Hess
35 Comments 1Vote
10 security best practice guidelines for consumers
Consumers need to proceed with extra caution to avoid scams, viruses, social engineering attempts, privacy-leaking apps, and malicious software of every flavor. These guidelines will keep you on the straight and narrow.
March 5, 2013 by Ken Hess
7 Comments 1Vote
10 security best practice guidelines for businesses
Businesses need extreme security measures to combat extreme threats. Here are 10 best practices that provide defense against the majority of all security threats.
March 4, 2013 by Ken Hess
2 Comments Vote
Don't you just love mobile apps? So do malicious code writers.
There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.
March 3, 2013 by Ken Hess
3 Comments Vote
The second most important BYOD security defense: user awareness
Outside of the IT department, most users think that viruses are the only threat to their computing equipment. Many believe that malware doesn't affect mobile devices at all. An educated user is a safer user.
February 24, 2013 by Ken Hess
4 Comments Vote
Can RIM's BlackBerry 10 bring it back from the brink of obscurity?
In a mobile security challenged world, Blackberry 10 might be just the ticket we've all been waiting for. Could it be that RIM is back in the game? Could be.
February 21, 2013 by Ken Hess
42 Comments 1Vote
10 things you can do to boost your BYOD security
If you're going to allow users to bring their own devices, find out what you can do to maintain security and be a happier you. These ten security recommendations will help you do both.
February 20, 2013 by Ken Hess
6 Comments Vote
Android security suffers the slings and arrows of outrageous fortune
Android's overwhelming popularity may be its undoing. Malware against Android exceeds threats against Windows. The threats are bigger and more is at stake than ever before.