Sony’s reminder to users: Email never dies

Every once in a while a story comes along that gets different reactions from different groups. For IT, the reaction to Sony’s leaked emails was, “Well, yeah, of course that shouldn’t have been put in writing.” For users, it was, “Wait … you mean those weren’t completely private?” 

Microsoft’s next end of life might come without options

When an end-of-life deadline hits popular products or services, companies usually face one of two options: Upgrade or pay for extended support. But at least one high-ranking executive theorizes that option may not exist for Windows Server 2003 customers. 

Sony’s security nightmare appears to be a case of ransom

For two straight days, IT experts have scrambled to undo a massive cyberattack that has locked employees of Sony Pictures out of their work computers. It appears the machines are being held ransom – though little is known about how or who’s doing it. 

Windows flaw highlights insider threat risk

A serious privilege escalation flaw has been found in all supported versions of Windows. Here’s what it could mean for businesses – and why you need to patch your systems immediately. 

What are companies doing with their sensitive data?

All too often, we don’t actually get a look into how companies store and organize their data until there’s a high-profile breach that comes to light. A recent study looks to shed some light on how this crucial IT practice is handled. 

Planning ahead: The next 5 years in IT

One of the biggest challenges that IT faces – more-so than most other fields – is the rapidly changing and shifting focus. Every time you feel like you have a handle on the latest tech trends, something new comes down the pike.

Agency issues first-ever data breach fine: $10 million

The Federal Communications Commission (FCC) was not impressed with phone carriers’ data security practices. So the agency took the unprecedented step of issuing a fine for the breach: $10 million in total. 

Company victimized by hacker and its own cyberinsurance

Data breaches are scary for any business, so many companies turn to cyberinsurance for a little peace of mind. Just be sure that your insurer will actually have your back in a worst-case scenario. Here’s how an ugly case is playing out in court following a hacker attack. 

The anatomy of a spearphishing campaign: 3 keys to stopping one

TrendMicro has discovered and reported on a spearphishing campaign that went after some very high-value targets. What it found could have lessons you can use for protecting your own users. 

Beware of VoIP scammers: 3 keys

While companies scramble to protect their systems against hackers, one target is increasingly becoming a popular means of stealing money: the humble land line.