It’s December, which means it’s the time to look back on the year’s best-of lists, top news stories … and yes, even malware attacks and security threats.
What’s one often overlooked area hiding a lot of IT security threats? Hint: It’s the part of the IT department that has the most frequent contact with the rest of the organization.
Increasing users’ security awareness can be one of IT’s most difficult jobs. But here’s one technique that might help, even with stubborn users.
At the recent Def Con security conference in Las Vegas, participants in a hacking contest showed how easily criminals can use social engineering attacks to steal a lot of sensitive information.
A recent hacking contest shows that businesses are still too vulnerable to social engineering attacks.
Though many different types of people have become victims of online security attacks, there are some groups you’d think would be better at protecting their personal information. But a recent study shows IT professionals and even hackers themselves are also prone to mistakes.
As 2010 draws to a close, it’s a good time to reflect on the mistakes of the past year and learn from them. Here are five notable breach stories from 2010 — and the lessons they teach:
You’ve got your applications patched, the latest firewall enabled and your antivirus programs updated. But there are some big security holes that might still be wide open: