From the network breach at RSA to theft of intellectual property in Operation Aurora, it is no secret that some of the most visible hacking involves the use of spear phishing. A targeted form of phishing that is custom-made for a specific organization, a spear phishing email message seeks to elicit a desired action that could result in a Trojan being loaded, or the unintended leaking of confidential or privileged data.
As Paul Mah has written in the past, defending against spear phishing is a challenging task that mandates some amount of user training. To assist organizations on this front, Paul has come up with a simple checklist to help identify a potential phishing message.
Five Reasons Project Portfolio Management Will Matter to CIOs in 2012 PPM is moving beyond business projects to managing value and change, as well.
Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012 Businesses need to increase their focus on identity and privacy projects that can deliver real value not just to IT, but also to the business.
Spam and Phishing Report: Scammers Taking Advantage of Major EventsSpammers are using major events and holidays to make their mail more appealing.
Email is an integral part of working, but for far too many workers, it hurts rather than helps their productivity. ... More >>
Despite their importance, many SMBs let their tech solutions languish and turn into outdated relics that can't offer the necessary speed, collaboration and functionality for the modern user or customer. ... More >>
In the past decade, business software usage has evolved in a number of ways to meet the changing needs of organizations and users in the digital age. ... More >>