It’s one thing to train users on avoiding phishing attacks. But knowing whether that training has really sunk in isn’t always the easiest thing to accomplish. Enter the phishing test.
IT pros have used a wide variety of analogies, tricks and visuals to try to get non-techies to understand the cloud. But here’s one we never thought we’d see.
A French TV network recently had to take 11 channels off the air temporarily while it responded to a major coordinated hacking attack. And it seems that incident didn’t teach them any lessons.
There’s a recent court case that might have escaped your notice – but the decision could serve as a warning for IT pros.
A Google HR exec has a new book out that tells you how to hire the best candidates just like Google does … that is, if you have a nearly unlimited budget and a giant organization behind you.
A survey by Tata Communications looked to answer a pretty simple question: Has the cloud lived up to your expectations? Well, the results are in, and the verdict is …
Security is no laughing matter – until it’s tackled by one of the preeminent comedians of the day.
The most effective malware often relies on tried-and-true tactics executed to perfection by hackers. The latest example: Dyre Wolf, malware with a human element. Here’s how attackers have tricked companies out of more than $1 million so far.
Users are your best security asset, but sometimes their actions can make them your worst nightmare. Here are three recent cases that highlight the importance of an attentive and security-conscious user base.
There are certain statements in IT that just become almost accepted at face value over time: Internet Explorer is the worst. Apple devices don’t get viruses. Android devices are inherently dangerous.