From the network breach at RSA to theft of intellectual property in Operation Aurora, it is no secret that some of the most visible hacking involves the use of spear phishing. A targeted form of phishing that is custom-made for a specific organization, a spear phishing email message seeks to elicit a desired action that could result in a Trojan being loaded, or the unintended leaking of confidential or privileged data.
As Paul Mah has written in the past, defending against spear phishing is a challenging task that mandates some amount of user training. To assist organizations on this front, Paul has come up with a simple checklist to help identify a potential phishing message.
The goal of eHealth projects is to encourage diagnostics and treatment in scenarios in which patient and professional are in different places. ... More >>
These mobile Android apps are maturing into tools that get us together more quickly and easily to collaborate on projects and plans. ... More >>
Governance recommendations for businesses that have deployed or are thinking about implementing SharePoint or another collaboration tool. ... More >>