It’s been a busy year for IT pros. And next year isn’t shaping up to be much better.
Edward Snowden and the NSA had them rethinking internal threats. Microsoft sent out Windows 8.1 in an effort to save a troubled operating system. And along the way there were plenty of new iPhones, Android devices and more that had managers double-checking their BYOD policies to make sure they were airtight.
So what stories were you reading most? Check out the top 10 in our year in review.
Most companies are using antivirus software, firewalls and other security tools to protect their networks. But attackers are constantly finding new ways to get around those controls. More.
IT departments rely on several different policies to keep systems up and running and protect company data. Unfortunately, IT policies are only as effective as the users who are expected to follow them. More.
As more employees bring personal smartphones and other devices to work, here are three BYOD security horror stories that other companies can learn from. More.
IT pros likely understand that websites featuring illegal downloads and other seedy items aren’t necessarily the parts of the Internet most likely to get a computer infected with a virus. But users may not know that, and that could impact their online behavior. More.
When it comes to protecting data, one of the biggest challenges for IT is getting users to follow best practices for password protection. However, many organizations try to enforce practices that do little to actually make passwords more secure. More.
All organizations depend on IT to keep operations up and running. That means tech mistakes – even seemingly minor ones – can have a huge impact on the organization and its bottom line. More.
While there are many new ways hackers are attempting to steal sensitive data, there are still a lot of attacks launched the (relatively) old-fashioned way: through malicious emails.
In fact, 95% of all data breaches begin with a phishing email sent to trick the recipient into volunteering sensitive information, clicking on a malicious link or downloading malware, according to a recent report from email security firm Agari. More.
Women have recently taken several notable positions at the forefront of big tech companies. Unfortunately, they remain the exception to the rule.
Learn about the presence – or lack thereof – of women in technology, from dismal numbers to inspiring success stories and resources for supporting ambitious, tech-minded women. More.
A company’s own employees are a much bigger threat to IT security than hackers, a new survey shows. Here are top ways users threaten security – and why IT departments fail to stop them. More.
Social media has been common for both personal and professional use for several years – however, many companies still haven’t caught up and developed an effective social networking policy. Here’s a template you can use to build your own social networking policy that’ll protect your company and your users. More.