Video shows just how attackers commit CEO fraud

You might think your users would be savvy enough to spot a fake email from a scammer posing as a high-ranking company official. And maybe they do. But this video shows how even the best employees can be tricked by social engineering tactics. 

The hardest position in IT to fill is …

Let’s face it: Hiring IT team members is tough. Specialization has made it harder than ever. 

You’ll have to wait for Microsoft’s zero-day patch

The latest debate about when it is or isn’t OK to release details of a security vulnerability involves a couple of familiar foes, Microsoft and Google. And while this debate rages, Windows customers will have to wait, knowing they’re vulnerable to attack. 

Microsoft’s new patching policy may be an IT pro’s nightmare

As of the latest Patch Tuesday, Microsoft has done away with letting PC and business users decide which patches they want to download. 

Overworked help desk? 10 ways to cut the stress

It’s no secret that the IT help desk doesn’t always get along with all users throughout the company. Here are some steps IT managers can take to repair the relationship and keep IT support staff productive.

3 personalities your help desk needs

There are plenty of nightmare stories out there about awful IT techs – the kind that can give your department a bad reputation or just turn users off of IT in general. But here are three types of employees you should be on the lookout for when hiring or as great assets your company already has that […]

iOS update thwarts huge threat to mobile security

Apple has issued a fix that you need to install right away if you’re an iPhone user.

Wikileaks file dump contains malware: Report

Whether you side with Wikileaks or not in its mission to spill secrets, here’s some advice most people can get behind: If you’re going to release documents for public consumption, maybe check them for viruses first.

5-year-old malware discovered: Why it took so long

Many surveys ask IT pros whether they’ve been breached in the past month, year, etc. But that question overlooks a common problem: Many companies that are breached don’t know it yet – and some conceivably never will. Case in point: Researchers recently uncovered a malware strain that’s been active since at least 2011. This highly […]

3 infographics that perfectly sum up why women are needed in IT leadership

There has long been a gender gap in IT-related fields. But just where does this shortage of women in the Science, Technology, Engineering and Math (STEM) field come from? And what can be done to reverse the trend?