Chipotle’s email mistake could’ve been costly

Burrito giant Chipotle must have said “No thanks,” when it was asked, “Do you want to buy your own domain for a few dollars extra?” 

Google Apps for Work working for phishers?

Phishers may take advantage of a security flaw in Google that a hacker recently discovered. This could allow anyone to send emails that appear to be from legitimate companies’ domain names. Here’s how it works … 

Hillary Clinton has a very familiar email problem

IT managers have long dealt with employees who don’t know or choose to ignore email policy. That’s as true at small and mid-size businesses as it is at the State Department, where it’s been revealed Hillary Clinton insisted on using her own email. 

Which emails are most likely to be phishing?

When it comes to phishing attempts, anyone can be a target. The question is: How will the attackers try to fool users? 

Sony’s reminder to users: Email never dies

Every once in a while a story comes along that gets different reactions from different groups. For IT, the reaction to Sony’s leaked emails was, “Well, yeah, of course that shouldn’t have been put in writing.” For users, it was, “Wait … you mean those weren’t completely private?” 

The IT challenge many forget about

So let’s see, there’s the cloud, security breaches, bring your own device … what are we forgetting here? Oh, right. Email. That thing that still takes up huge amounts of IT’s time and resources every day. 

Which users are the most likely phishing victims?

Many cyber attacks begin with phishing emails directed at an organization’s employees. According to a new report, those scams can often fool even those who should know better. 

Top 10 ways employees put your company’s data at risk

Businesses face a lot of IT security threats, but a large percentage could be avoided with a change in users’ behavior. Here are 10 of the most common ways employees put their companies at risk: 

Court: Company can’t read personal email on employee’s smartphone

As more employees use mobile devices for work, IT departments are trying to develop policies to protect sensitive company information from new mobile security threats. But rules might also be needed to protect employee privacy as well. 

The 5 most dangerous types of email

While there are many new ways hackers are attempting to steal sensitive data, there are still a lot of attacks launched the (relatively) old-fashioned way: through malicious emails.