Top Story

finger-on-tablet-2

Sample data transfer and storage policy template

Storing and transferring data has never been easier for workers – or more dangerous. Here is a sample policy you can build off of in order to set rules and best practices for how users can transfer sensitive information without letting it fall into … Continue Reading

More IT News

Snapchat’s reminder: Nothing engineered is truly secure

There's another sleazy leak of photos online. With thousands of photos hacked from Snapchat, let this be a reminder: Once data leaves your control, it's never really secure.  … Continue Reading

Mobile malware infects users, then goes after contacts

A revamped version of recently discovered mobile malware pulls out all the stops: It uses multiple methods of attack, spreads rapidly to users' contact lists via text messages and disguises itself well. Here's what to watch out for.  … Continue Reading

FBI issues warning: Watch out for insider threats

The Federal Bureau of Investigation (FBI) recently sounded an alarm for IT pros. It's seen an uptick in cyberattacks against businesses – and the threat is increasingly coming from disgruntled and former employees.  … Continue Reading

‘Jimmy Kimmel’ is IT Public Enemy No. 1

OK, that might be stretching it a bit much. But in McAfee's annual report of the most dangerous celebrity searches, ABC's late night funnyman came out on top.  … Continue Reading

What JPMorgan says about cybersecurity shortcomings

Another day, another major data breach. This time, it's JPMorgan's turn in the spotlight, as the private information of 76 million households and 7 million small businesses was exposed in a relatively simple phishing attack.  … Continue Reading