Shadow cloud is a growing threat: 3 keys for IT pros

Chances are your users are running some potentially dangerous programs and services right under your nose. And these could be putting your organization’s security at high risk. 

Believe it or not, tech support scams fool younger users

Tech support scams are usually thought of as a low-down way for operatives to fool older users who may not be tech savvy. But a new study finds that these scammers can have a field day with Millennials who grew up around technology, too.

How companies are failing their best security pros

Do you have any security pros on your staff? If so, there’s a good chance that they’ve been offered a job with your competitors in the past seven days.

Half of IT pros make these critical mistakes when deleting data

Wiping hard drives, laptops, servers and other hardware may not be high on your list of priorities. But a new study indicates it probably should be – and that when it comes to clearing data, many IT pros are making big mistakes.

When security and productivity clash, who wins?

Users generally want to do the right things for security. The problem is that doing things the right way may be a hindrance to their actual jobs – and when it is, security doesn’t stand a chance of winning.

Could data breaches be less costly than we all thought?

The average cost of a data breach is almost impossibly hard to determine, but that hasn’t discouraged many from trying. And while the figures researchers come up with are usually downright scary, recent research says it could be much less than we all thought – less than half of a percent of annual revenues.

What’s holding IT back from security improvements?

Sixty-five percent of IT pros predict a serious information breach in the coming year. But certain barriers to improving security are holding them back.

Public cloud adoption: Challenges and best practices

It was once thought the only safe cloud option for businesses was a private or hybrid cloud model. But that’s no longer the case, according to a new survey. It finds that most organizations use at least some public cloud services, but that challenges abound.

Privileged users put info at risk … And IT doesn’t know what to do about it

A flurry of recent surveys and studies have found that users may have too much access to data recently. But now comes one that confirms IT is aware of this situation … and seriously concerned by it.

Phishing hazards go well beyond users alone

Most of the advice surrounding phishing prevention is warning users of the dangers and encouraging them to use caution when browsing or opening emails. But one of the biggest risks for a phishing attack won’t be fixed by these commonsense approaches.