Google survey finds security pros, users don’t see eye-to-eye

You’ve probably already figured this one out, but a recent survey from Google shows that your security priorities and those of your users’ often don’t line up. 

Is your company’s website secure? Maybe not

There’s no shortage of systems that can be attacked within an organization. But one that may go overlooked frequently is also one of the most vulnerable: the company’s website. 

Survey: Some IT managers need to learn to share

When threats are discovered, many IT pros go into red alert mode, gathering their teams and sharing the discovery. Then there are those who sit on the information, preferring to keep this critical info to themselves. 

90% of users still have access to old work accounts

No one is ever truly gone if we remember them … or if we forget to revoke their access. 

Infographic: The hunt for the fastest Internet speeds

Big data, streaming services, Voice over IP (VoIP) and more have driven demand for faster Internet speeds nationwide. But availability is still lagging behind demand – and in some cases, even where high-speed Internet is available, the cost can be sky-high. 

Phisher went after nuclear secrets from within

Two hot topics in security came to a head recently with an indictment of a former U.S. Department of Energy employee who was spearphishing dozens of his co-workers and bosses. 

The only 2 security metrics that matter to execs

Knowing how to talk security with the C-level or board of directors can be difficult. But according to one IT pro, the entire conversation can revolve around two simple metrics – and result in buy-in for your department. 

30% of companies would cave to ransomware pressure

  It’s hard to tell any company what to do when it’s in a no-win situation where its data is being held ransom by hackers. Even though the smartest approach might be to stay strong and not cave to the pressure, when it’s your information at stake, it’s tough to take the moral stand. 

From inbox to bank account: Tracing dastardly malware’s path

The most effective malware often relies on tried-and-true tactics executed to perfection by hackers. The latest example: Dyre Wolf, malware with a human element. Here’s how attackers have tricked companies out of more than $1 million so far. 

3 ways users are leaking sensitive data now

Users are your best security asset, but sometimes their actions can make them your worst nightmare. Here are three recent cases that highlight the importance of an attentive and security-conscious user base.