3 most dangerous IT security threats for 2013 – and how to stop them

Most companies are confident their information is secure, but in reality, the data shows most organizations are struggling to deal with emerging IT security threats. 

The top threats facing SMB networks

Keeping networks up and running is a critical job of any company’s IT department. Problems with the network can lead to down time, which in turn may mean lost revenue. 

OS security: Will this firm build the first invulnerable operating system?

Hackers often attack vulnerabilities in operating systems, making OS security one of IT’s top concerns. One company says it has a solution for preventing further attacks: an OS with no security holes. 

Java security attacks on the rise: How can IT limit the risk?

Attacks targeting Java vulnerabilities are common, including the most recent round of attacks that could affect users running any browser in any OS. What can IT do to limit Java security risks? 

40% of users ignore software patch prompts

A key part of any company’s security strategy should be a thorough software patch process. And a new survey offers some advice on keeping software secure and up to date: 

5 scariest stories from Black Hat 2012

At the recent Black Hat security conference in Las Vegas, security professionals unveiled a host of new security threats facing corporate and personal technology. These were the scariest new attacks demonstrated: 

Top 5 website security holes you can fix now

A company’s website is often a prime target for hackers. Cybercriminals can use vulnerabilities in sites to gain access to sensitive company information. Or, they can hijack those legitimate sites to spread malware to visitors’ machines.  The good news: As awareness of the threats is increasing, websites are becoming more secure, according to a study of […]

5 common IT mistakes behind 97% of data breaches

Many businesses are spending money on advanced security tools but missing basic defenses against hackers’ attacks, according to a study of recent data breaches. 

Study: IT leaving old vulnerabilities open to hackers

Despite all the hype about the cutting edge techniques hackers are using to steal companies’ data now, many attackers still have a lot of luck exploiting vulnerabilities that received patches from vendors months or even years ago. 

The most common IT security attacks, defined

IT security attacks come in a variety of flavors. Are you and your IT staff familiar with all of them?