Social networks are rapidly becoming the preferred delivery vehicle for all sorts of malware. Most threats come from fake pages that are socially engineered to get unsuspecting users to click on a piece of content that winds up delivering a hidden malware payload.
In a survey of over 4,300 end users conducted by Sophos, it’s becoming clear that end users are more aware of the potential threat. But awareness does not necessarily translate into a change of behavior.
BYOD: User Policy Considerations Questions and key points companies should consider when establishing BYOD policies.
Five Mobile Business Intelligence Traps to Avoid Businesses should avoid these pitfalls as they dive into mobile BI deployments.
Top Six Service Desk Concerns and How to Alleviate Them Examining help desk concerns of top IT decision makers through social media conversations.
Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ... More >>
While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ... More >>
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>