Two-thirds of information technology professionals are on Apple’s side in an ongoing dispute over whether encryption should be broken to aid in law enforcement.
Part of an effective IT security program for most businesses should be protecting online transactions with customers. In this guest post, Anand Srinivasan describes some of the website security keys businesses should keep in mind.
Allowing users to carry sensitive data on a portable computing device creates a certain amount of risk. But here’s a data breach that occurred because several pieces of IT equipment were stolen from an employee’s car.