Fraud Protection February 15, 2017 Time to Stop Shaming Phishing Victims 2 min read - It is counterproductive to shame phishing victims because it discourages end users from alerting IT professionals of suspicious emails or activity.
Endpoint January 23, 2017 Perspectives on Securing Mobile and Social Business, 12 Months On 4 min read - The IT landscape has changed since we issued our paper on securing mobile and social business in late 2015. We revised our findings to reflect this shift.
Endpoint January 18, 2017 Securing Human Endpoints Through Cyber Situational Awareness 3 min read - Humans represent the weakest link in the cybersecurity chain. An effective defense strategy starts and ends with cyber situational awareness.
Identity & Access January 12, 2017 IP Theft: How Often Does Your IP Walk Out the Door? 3 min read - Outgoing employees are motivated by revenge, greed and resentment to abscond with valuable data. A robust exit process is the key to preventing IP theft.
Application Security January 12, 2017 Protecting Your Staff in Co-Working Spaces 2 min read - Co-working spaces can help companies maximize productivity, but they can also introduce security concerns if employees are not trained to connect securely.
Data Protection January 3, 2017 Subtlety Is the Danger for Cybercrime Security Efforts 3 min read - With threats coming from all sides, it's easy for IT professionals to forget that cybercrime can take many unsophisticated forms.
X-Force December 19, 2016 Hacked for the Holidays: When You’re Asked to Fix the Family Computer 3 min read - If you're an IT professional, you'll likely be tapped to fix the family computer this holiday season. Leave your loved ones with these online safety tips.
Application Security December 7, 2016 For Science! Steps for Safe Volunteer Computing 3 min read - The old adage that "time is money" is proven once again when it comes to volunteer computing. Here's what you need to know before signing onto a project.
CISO November 11, 2016 Understanding the CIO’s Role in Security 2 min read - The CIO's role in security includes understanding the company's key vulnerabilities, spreading internal awareness and communicating with top executives.
November 10, 2016 WoT Privacy Breach: Trust Tanks as Browser Add-On Caught Selling User Data 2 min read - The WoT privacy breach highlights the commonplace nature of third-party data selling and frequent failure to read the fine print in user agreements.