The top 10 tech stories of 2013


It’s been a busy year for IT pros. And next year isn’t shaping up to be much better.

 Edward Snowden and the NSA had them rethinking internal threats. Microsoft sent out Windows 8.1 in an effort to save a troubled operating system. And along the way there were plenty of new iPhones, Android devices and more that had managers double-checking their BYOD policies to make sure they were airtight.

So what stories were you reading most? Check out the top 10 in our year in review.

10. 3 ways malware is bypassing companies’ antivirus software

Most companies are using antivirus software, firewalls and other security tools to protect their networks. But attackers are constantly finding new ways to get around those controls. More.

9. 3 IT policies most users ignore

IT departments rely on several different policies to keep systems up and running and protect company data. Unfortunately, IT policies are only as effective as the users who are expected to follow them.  More.

8. 3 BYOD security horror stories – and what IT can learn from them

As more employees bring personal smartphones and other devices to work, here are three BYOD security horror stories that other companies can learn from.  More.

7. The 10 most dangerous parts of the Internet

IT pros likely understand that websites featuring illegal downloads and other seedy items aren’t necessarily the parts of the Internet most likely to get a computer infected with a virus. But users may not know that, and that could impact their online behavior. More.

6. 5 password security myths to forget now

When it comes to protecting data, one of the biggest challenges for IT is getting users to follow best practices for password protection. However, many organizations try to enforce practices that do little to actually make passwords more secure. More.

5. The 25 costliest tech screw ups of all time

All organizations depend on IT to keep operations up and running. That means tech mistakes – even seemingly minor ones – can have a huge impact on the organization and its bottom line.  More.

4. The 5 most dangerous types of email

While there are many new ways hackers are attempting to steal sensitive data, there are still a lot of attacks launched the (relatively) old-fashioned way: through malicious emails.

In fact, 95% of all data breaches begin with a phishing email sent to trick the recipient into volunteering sensitive information, clicking on a malicious link or downloading malware, according to a recent report from email security firm Agari.  More.

3. Women in technology: Triumphs and barriers

Women have recently taken several notable positions at the forefront of big tech companies. Unfortunately, they remain the exception to the rule.

Learn about the presence – or lack thereof – of women in technology, from dismal numbers to inspiring success stories and resources for supporting ambitious, tech-minded women. More.

2. 7 most dangerous sites users love to visit

A company’s own employees are a much bigger threat to IT security than hackers, a new survey shows. Here are top ways users threaten security – and why IT departments fail to stop them. More.

1. Social networking policy template

Social media has been common for both personal and professional use for several years – however, many companies still haven’t caught up and developed an effective social networking policy. Here’s a template you can use to build your own social networking policy that’ll protect your company and your users. More. 

 

Make Smarter Tech Decisions

Get the latest IT news, trends, and insights - delivered weekly.

Privacy Policy

Related Posts