All ransomware is basically the same, right? Wrong. The means by which the malicious files wind up infecting computers and the fallout can vary wildly – and if you’re not up on the latest trends, you could be the next to fall victim.
We’re less than a month away from 2017. While you’re pondering where the months went, be sure to take a look forward and see where we go from here.
Opinions and attitudes about the cloud are changing constantly. And while most companies are accepting of it as a useful tool, there still are those who have fears and concerns.
There has always been somewhat of a divide between IT and C-level executives on technology matters. One recent survey shows the latest cause for concern: Executives think their disaster recovery program will be sufficient, but IT isn’t so sure.
The latest debate about when it is or isn’t OK to release details of a security vulnerability involves a couple of familiar foes, Microsoft and Google. And while this debate rages, Windows customers will have to wait, knowing they’re vulnerable to attack.
Chances are your users are running some potentially dangerous programs and services right under your nose. And these could be putting your organization’s security at high risk.
Tech support scams are usually thought of as a low-down way for operatives to fool older users who may not be tech savvy. But a new study finds that these scammers can have a field day with Millennials who grew up around technology, too.
Do you have any security pros on your staff? If so, there’s a good chance that they’ve been offered a job with your competitors in the past seven days.
Wiping hard drives, laptops, servers and other hardware may not be high on your list of priorities. But a new study indicates it probably should be – and that when it comes to clearing data, many IT pros are making big mistakes.