Getting better results from phishing tests (good or bad)

It’s one thing to train users on avoiding phishing attacks. But knowing whether that training has really sunk in isn’t always the easiest thing to accomplish. Enter the phishing test. 

Analyst: The cloud is like dating (really)

IT pros have used a wide variety of analogies, tricks and visuals to try to get non-techies to understand the cloud. But here’s one we never thought we’d see. 

Network gets a lesson in Passwords 101

A French TV network recently had to take 11 channels off the air temporarily while it responded to a major coordinated hacking attack. And it seems that incident didn’t teach them any lessons.

Restricting app access can be discrimination, court rules

There’s a recent court case that might have escaped your notice – but the decision could serve as a warning for IT pros.

Hire techs like Google … more or less

A Google HR exec has a new book out that tells you how to hire the best candidates just like Google does … that is, if you have a nearly unlimited budget and a giant organization behind you. 

Cloud hype seems to be justified

A survey by Tata Communications looked to answer a pretty simple question: Has the cloud lived up to your expectations? Well, the results are in, and the verdict is … 

Video: Password advice from Edward Snowden

Security is no laughing matter – until it’s tackled by one of the preeminent comedians of the day. 

From inbox to bank account: Tracing dastardly malware’s path

The most effective malware often relies on tried-and-true tactics executed to perfection by hackers. The latest example: Dyre Wolf, malware with a human element. Here’s how attackers have tricked companies out of more than $1 million so far. 

3 ways users are leaking sensitive data now

Users are your best security asset, but sometimes their actions can make them your worst nightmare. Here are three recent cases that highlight the importance of an attentive and security-conscious user base. 

Android: Maybe not as dangerous as we thought

There are certain statements in IT that just become almost accepted at face value over time: Internet Explorer is the worst. Apple devices don’t get viruses. Android devices are inherently dangerous.