No one is ever truly gone if we remember them … or if we forget to revoke their access.
Big data, streaming services, Voice over IP (VoIP) and more have driven demand for faster Internet speeds nationwide. But availability is still lagging behind demand – and in some cases, even where high-speed Internet is available, the cost can be sky-high.
Two hot topics in security came to a head recently with an indictment of a former U.S. Department of Energy employee who was spearphishing dozens of his co-workers and bosses.
Knowing how to talk security with the C-level or board of directors can be difficult. But according to one IT pro, the entire conversation can revolve around two simple metrics – and result in buy-in for your department.
It’s hard to tell any company what to do when it’s in a no-win situation where its data is being held ransom by hackers. Even though the smartest approach might be to stay strong and not cave to the pressure, when it’s your information at stake, it’s tough to take the moral stand.
The most effective malware often relies on tried-and-true tactics executed to perfection by hackers. The latest example: Dyre Wolf, malware with a human element. Here’s how attackers have tricked companies out of more than $1 million so far.
Users are your best security asset, but sometimes their actions can make them your worst nightmare. Here are three recent cases that highlight the importance of an attentive and security-conscious user base.
Companies are paying lip service to their disaster recovery plans, but according to a recent survey, they aren’t actually putting in the legwork to make sure outages are planned for.
Virtualization has been around for a good while, but it hasn’t caught on everywhere yet. Here’s where companies stand with the technology – and insight into what they’re running it on.
OK, so maybe that’s a bit of an over-simplification. But in honor of March Madness, let’s look at how sports fans rank in another competitive field: security.