Training users isn’t easy. Heck, even finding the time to do it is difficult. But the security awareness they bring out of a session will pay off if it leads to smarter behavior online.
IT Security News
IT security news and insights to keep your data and infrastructure safe. Learn the latest strategies and best practices to protect against viruses, hackers, and disasters.
The reason phishing attacks remain popular is they’re extremely effective. The best ones can go nearly undetected and can cause devastating damage to companies. Here are three active attacks you’ll want to keep an eye on – and make sure your users are aware of.
A serious privilege escalation flaw has been found in all supported versions of Windows. Here’s what it could mean for businesses – and why you need to patch your systems immediately.
Most IT pros say that cloud decisions are rarely handled by the security team, and that’s a serious problem. No wonder they also say that the cloud adds risk.
TrendMicro has discovered and reported on a spearphishing campaign that went after some very high-value targets. What it found could have lessons you can use for protecting your own users.
It mimics Cryptolocker, but this malware isn’t the same as the now mostly defunct ransomware. This one, CryptoWall, is spread by ad networks on some popular sites, exposing as many as three million users a day.
While companies scramble to protect their systems against hackers, one target is increasingly becoming a popular means of stealing money: the humble land line.
A new survey highlights several problems with passwords: They’re forgettable, inefficient and users would rather listen to “The Macarena” than put up with them. (No, seriously. They would.)
Cyberattacks are going to cost companies some serious cash. The only really question is how much it will be and what steps you need to take to prepare for these devastating incidents.
Two recent reports show that neither users nor IT are particularly comfortable with BYOD as it stands today. And while IT is working to refine these policies, users are likely to ignore them.