Posted on February 14, 2012
by Lisa Vaas
in Privacy, Vulnerability
Posted January 25, 2012 Videoconferencing equipment is often left wide open for hackers to creep in and peep around organizations. Here’s the article.
Follow @LisaVaas on Twitter
© 2015 Purveyor of High-Quality Verbiage. All Rights Reserved.
Powered by WordPress. Designed by