For two straight days, IT experts have scrambled to undo a massive cyberattack that has locked employees of Sony Pictures out of their work computers. It appears the machines are being held ransom – though little is known about how or who’s doing it.
Good help might be hard to find these days. But finding good candidates with the right skills can seem downright impossible.
Training users isn’t easy. Heck, even finding the time to do it is difficult. But the security awareness they bring out of a session will pay off if it leads to smarter behavior online.
A serious privilege escalation flaw has been found in all supported versions of Windows. Here’s what it could mean for businesses – and why you need to patch your systems immediately.
Stress at work isn’t just a minor annoyance. If it isn’t kept in check, it can lead to employees checking out according to a recent survey.
Most workers today want to be able to work from their own mobile devices at least some of the time, yet security will still present a major problem. So what’s keeping BYOD programs from being effective? In short, it’s the users themselves.
All too often, we don’t actually get a look into how companies store and organize their data until there’s a high-profile breach that comes to light. A recent study looks to shed some light on how this crucial IT practice is handled.
One of the biggest challenges that IT faces – more-so than most other fields – is the rapidly changing and shifting focus. Every time you feel like you have a handle on the latest tech trends, something new comes down the pike.
Sometimes it takes some examples of truly awful employees to remind us that maybe we don’t actually have it so bad.
Most IT pros say that cloud decisions are rarely handled by the security team, and that’s a serious problem. No wonder they also say that the cloud adds risk.