A lot of adjectives are thrown around to describe hackers: “brazen,” “devious,” and quite a few we probably shouldn’t repeat on a safe-for-work site. One that you may not expect, however, is “helpful.”
There are plenty of surveys and studies that cover how IT feels about mobile threats. But what do your users think about all the corporate data they have on their mobile devices?
Wake up. Drive into the office. Turn on computer. Make a pot of coffee in the break room. Find malware.
In a few short years we’ve gone from an abstract thing called “the cloud” to more cloud providers and services than you can shake a stick at. But one fundamental question remains for many IT pros: Is it really safe to store your information in the public cloud?
Two hot topics in security came to a head recently with an indictment of a former U.S. Department of Energy employee who was spearphishing dozens of his co-workers and bosses.
Those who can’t handle stress might be wise to consider a career outside of IT, if a recent study is to be believed. It found most IT pros are feeling under the gun, and there’s a variety of reasons for it.
Speculation about what exactly Microsoft meant when talking about changes to its update process abounds. But from the sounds of it, if Patch Tuesday isn’t dying, it’s certainly changing.
There are a variety of threats that IT faces all the time, but the ones that could be most tricky to deal with are usually those that originate in-house. Whether it’s careless users putting systems at risk or malicious ones taking advantage, these insiders can cause serious damage to their organizations.
IT is an ever-changing and adapting part of any business. But the way companies manage these changes could be putting their organizations at risk, a recent study has found.
According to a recent study, companies are facing threats that they feel their technological defenses may not be capable of matching. Here’s what it means for you. EIQ Networks surveyed IT decision-makers to see how they felt their defenses stood up to modern threats. Many had some reservations about users’ ability to defend systems, and the […]