Social networks are rapidly becoming the preferred delivery vehicle for all sorts of malware. Most threats come from fake pages that are socially engineered to get unsuspecting users to click on a piece of content that winds up delivering a hidden malware payload.
In a survey of over 4,300 end users conducted by Sophos, it’s becoming clear that end users are more aware of the potential threat. But awareness does not necessarily translate into a change of behavior.
BYOD: User Policy Considerations Questions and key points companies should consider when establishing BYOD policies.
Five Mobile Business Intelligence Traps to Avoid Businesses should avoid these pitfalls as they dive into mobile BI deployments.
Top Six Service Desk Concerns and How to Alleviate Them Examining help desk concerns of top IT decision makers through social media conversations.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>
IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ... More >>