Top Story

man-smartphone

How much do companies monitor their BYOD users?

Most users who agree to BYOD policies do it reluctantly because of two main hang-ups: They are afraid of having personal devices wiped if they're lost or stolen, and they don't want IT to be able to monitor what they do on their phones.  … Continue Reading

More IT News

Security’s an afterthought when it comes to the cloud

Most IT pros say that cloud decisions are rarely handled by the security team, and that's a serious problem. No wonder they also say that the cloud adds risk.  … Continue Reading

Office 365 offers unlimited cloud storage

Both business and personal subscribers to Microsoft's Office 365 are about to receive a huge expansion to their cloud storage. It's going from one terabyte to unlimited space.  … Continue Reading

Agency issues first-ever data breach fine: $10 million

The Federal Communications Commission (FCC) was not impressed with phone carriers' data security practices. So the agency took the unprecedented step of issuing a fine for the breach: $10 million in total.  … Continue Reading

Company victimized by hacker and its own cyberinsurance

Data breaches are scary for any business, so many companies turn to cyberinsurance for a little peace of mind. Just be sure that your insurer will actually have your back in a worst-case scenario. Here's how an ugly case is playing out in court following a hacker attack.  … Continue Reading

The anatomy of a spearphishing campaign: 3 keys to stopping one

TrendMicro has discovered and reported on a spearphishing campaign that went after some very high-value targets. What it found could have lessons you can use for protecting your own users.  … Continue Reading