Windows flaw highlights insider threat risk

A serious privilege escalation flaw has been found in all supported versions of Windows. Here’s what it could mean for businesses – and why you need to patch your systems immediately. 

What are companies doing with their sensitive data?

All too often, we don’t actually get a look into how companies store and organize their data until there’s a high-profile breach that comes to light. A recent study looks to shed some light on how this crucial IT practice is handled. 

Planning ahead: The next 5 years in IT

One of the biggest challenges that IT faces – more-so than most other fields – is the rapidly changing and shifting focus. Every time you feel like you have a handle on the latest tech trends, something new comes down the pike.

Agency issues first-ever data breach fine: $10 million

The Federal Communications Commission (FCC) was not impressed with phone carriers’ data security practices. So the agency took the unprecedented step of issuing a fine for the breach: $10 million in total. 

Company victimized by hacker and its own cyberinsurance

Data breaches are scary for any business, so many companies turn to cyberinsurance for a little peace of mind. Just be sure that your insurer will actually have your back in a worst-case scenario. Here’s how an ugly case is playing out in court following a hacker attack. 

The anatomy of a spearphishing campaign: 3 keys to stopping one

TrendMicro has discovered and reported on a spearphishing campaign that went after some very high-value targets. What it found could have lessons you can use for protecting your own users. 

Beware of VoIP scammers: 3 keys

While companies scramble to protect their systems against hackers, one target is increasingly becoming a popular means of stealing money: the humble land line.  

What leads to unhappy IT pros? Survey has the answer

Keeping your staff happy may seem like a full-time job in and of itself. But it’s an important part of the job: When IT pros burn out, the fallout can cause serious headaches. 

While IT sweats BYOD policies, users reject them

Two recent reports show that neither users nor IT are particularly comfortable with BYOD as it stands today. And while IT is working to refine these policies, users are likely to ignore them. 

Mobile malware infects users, then goes after contacts

A revamped version of recently discovered mobile malware pulls out all the stops: It uses multiple methods of attack, spreads rapidly to users’ contact lists via text messages and disguises itself well. Here’s what to watch out for.