While this particular advice might strike some as taking a somewhat technophobic route, the fact is that the majority of modern hacks make use of the Web browser as the attack vector. As a result, hackers are making use of various social engineering or other trickery to get users to visit specially crafted websites to exploit newly discovered vulnerabilities.
A close cousin of this form of attack involves the use of attached files that are specifically crafted to exploit known flaws in their corresponding software.
In spite of the tremendous sums of money that organizations spend each year to defend themselves against hackers and malware, successful security incursions continue to occur with dismaying frequency. In the race to acquire the most sophisticated security tools, many forget that the first line of defense is really the user.
Our Paul Mah has come up with a list of six simple ways that employees can enhance the security of their workstations. Be sure to check out Paul's full post on the subject at his blog.
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ... More >>