The lines between old-fashioned hacking attacks and the kinds of high-tech, complicated code-cracking you might see in a “Mission Impossible” movie are starting to blur. And it’s a good reminder of why users should be practicing some basic rules on protecting smartphones.
IT departments often struggle with getting users to choose secure passwords and keep them safe. For help, here’s a password policy template companies can use to create their own written rules.
Browser security is one key to protecting an organization’s network, since the majority of security attacks come from the Internet. But security experts recently uncovered a flaw in a popular browser that could leave users open to a different kind of threat.
IT departments often struggle to get users to choose secure passwords. But many experts say they shouldn”t even bother.
Even as more employees start bringing personal smartphones and tablets to work, most small businesses aren’t taking steps to ensure BYOD security.