Cyber criminals always seem to stay one step ahead of IT – as protections improve in some areas, the hackers shift their focus to others.
As more employees use their personal computing devices at work, companies have to ask some questions about their rights to manage a gadget that someone else owns.
As more businesses turn to social media for marketing, customer service and other purposes, hackers are also increasingly targeting social networks to launch attacks against companies.
Hackers are moving away from widespread malware and focusing on targeted attacks against businesses and individuals. And that means an increase in phishing scams, as well as social media-based attacks.
IT departments rely on several different policies to keep systems up and running and protect company data. Unfortunately, IT policies are only as effective as the users who are expected to follow them.
Facebook has introduced a few features in recent months, including the new Facebook Home software. And experts have many Facebook Home privacy concerns.
Social media has been common for both personal and professional use for several years – however, many companies still haven’t caught up and developed an effective social networking policy.
These days, a positive online presence is almost as important as an impressive resume when it comes to advancing a career. In this guest post author Heather Legg offers some critical tips for IT pros trying to manage their online reputation.
As many organizations are still developing and fine-tuning their social networking policies for employees, here’s one practice that’s becoming illegal for some companies:
Even if they try, IT departments won’t put an end to employees’ use of social media at work. But there are some steps companies should take to minimize the risks.