From the network breach at RSA to theft of intellectual property in Operation Aurora, it is no secret that some of the most visible hacking involves the use of spear phishing. A targeted form of phishing that is custom-made for a specific organization, a spear phishing email message seeks to elicit a desired action that could result in a Trojan being loaded, or the unintended leaking of confidential or privileged data.
As Paul Mah has written in the past, defending against spear phishing is a challenging task that mandates some amount of user training. To assist organizations on this front, Paul has come up with a simple checklist to help identify a potential phishing message.
In an effort to get work done, employees will often skirt the rules of IT and turn to readily available file-sharing options outside the corporate IT structure. This opens the company up to a host of liabilities. ... More >>
By combining the flexibility, control, and cost-effectiveness of the cloud with the latest in app design and development, cloud-based mobility solutions offer enterprises a platform on which to base an efficient, effective, scalable and ultimately successful long-term mobile strategy. ... More >>
In addition to the many benefits for employees, businesses are also experiencing financial and non-financial benefits that had not been previously foreseen. ... More >>