You’ve probably already figured this one out, but a recent survey from Google shows that your security priorities and those of your users’ often don’t line up.
There’s no shortage of systems that can be attacked within an organization. But one that may go overlooked frequently is also one of the most vulnerable: the company’s website.
When threats are discovered, many IT pros go into red alert mode, gathering their teams and sharing the discovery. Then there are those who sit on the information, preferring to keep this critical info to themselves.
No one is ever truly gone if we remember them … or if we forget to revoke their access.
Big data, streaming services, Voice over IP (VoIP) and more have driven demand for faster Internet speeds nationwide. But availability is still lagging behind demand – and in some cases, even where high-speed Internet is available, the cost can be sky-high.
Two hot topics in security came to a head recently with an indictment of a former U.S. Department of Energy employee who was spearphishing dozens of his co-workers and bosses.
Knowing how to talk security with the C-level or board of directors can be difficult. But according to one IT pro, the entire conversation can revolve around two simple metrics – and result in buy-in for your department.
It’s hard to tell any company what to do when it’s in a no-win situation where its data is being held ransom by hackers. Even though the smartest approach might be to stay strong and not cave to the pressure, when it’s your information at stake, it’s tough to take the moral stand.
The most effective malware often relies on tried-and-true tactics executed to perfection by hackers. The latest example: Dyre Wolf, malware with a human element. Here’s how attackers have tricked companies out of more than $1 million so far.
Users are your best security asset, but sometimes their actions can make them your worst nightmare. Here are three recent cases that highlight the importance of an attentive and security-conscious user base.