Users who indulge in obtaining files from dubious locations or P2P sources are putting themselves at extreme risk of contacting a virus infection. It is relatively trivial to create a Trojan on top of legitimate (or working) software, and users might be left none the wiser.
In spite of the tremendous sums of money that organizations spend each year to defend themselves against hackers and malware, successful security incursions continue to occur with dismaying frequency. In the race to acquire the most sophisticated security tools, many forget that the first line of defense is really the user.
Our Paul Mah has come up with a list of six simple ways that employees can enhance the security of their workstations. Be sure to check out Paul's full post on the subject at his blog.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>