Sample data transfer and storage policy template

Storing and transferring data has never been easier for workers – or more dangerous. Here is a sample policy you can build off of in order to set rules and best practices for how users can transfer sensitive information without letting it fall into the wrong hands. 

Problems with passwords: Users hate them, can’t remember them

A new survey highlights several problems with passwords: They’re forgettable, inefficient and users would rather listen to “The Macarena” than put up with them. (No, seriously. They would.)

Gear up for 2015: Gartner predicts its Top 10

As we move into the fourth quarter of 2014, it’s getting to be about that time to look into the future and start planning for the next year’s priorities. Research firm Gartner is getting a bit of a jump on things by predicting what the biggest tech trends of 2015 will be.

Security’s on leadership’s radar, but IT can’t get a seat at the table

It wasn’t so long ago that IT pros struggled to get the top brass to care about and invest in security. That might be changing, but organizations seem slow to bring IT in at the highest level. Here’s why it matters.

What Windows 9 … uh, 10 … means for business

The biggest surprise of yesterday’s launch of the new Windows operating system wasn’t just that they skipped a number. It was that Microsoft has absorbed all the criticism of Windows 8, and is ready to put out an operating system it’s hoping businesses will fall in love with.

Lawsuit: Did company spy on former user’s iPhone?

When an employee links a personal account to a company iPhone, who is responsible for removing it when the user leaves the company? A court recently weighed in.

Rounding up mobile threats: Android vulnerable, millions of devices infected

While the media at large focuses on Apple’s iOS 8, new iPhones and smart watches, there’s been some bad news on the mobile security front yet again. Some highlights: A major Android flaw, and news that 15 million devices could be infected with mobile malware.

Yes, you can still trust the cloud … if you’re smart about it

Recent breaches have once again thrust an old question back into the spotlight: Can the cloud be trusted?

Compromising photos leaked: What it means for your users

An alarming gap in security seems to be to blame for private photos of celebrities leaking online. Apple’s claiming the problem has been fixed, but many remain skeptical and are wondering how it was allowed to happen in the first place. 

Study: Companies are years behind on security

Recent research by NTT Communications has an alarming takeaway: While companies may like to think they’re up-to-date on security, many are years behind in detecting and protecting against vulnerabilities.