Storing and transferring data has never been easier for workers – or more dangerous. Here is a sample policy you can build off of in order to set rules and best practices for how users can transfer sensitive information without letting it fall into the wrong hands.
It wasn’t so long ago that IT pros struggled to get the top brass to care about and invest in security. That might be changing, but organizations seem slow to bring IT in at the highest level. Here’s why it matters.
An alarming gap in security seems to be to blame for private photos of celebrities leaking online. Apple’s claiming the problem has been fixed, but many remain skeptical and are wondering how it was allowed to happen in the first place.