Social networks are rapidly becoming the preferred delivery vehicle for all sorts of malware. Most threats come from fake pages that are socially engineered to get unsuspecting users to click on a piece of content that winds up delivering a hidden malware payload.
In a survey of over 4,300 end users conducted by Sophos, it’s becoming clear that end users are more aware of the potential threat. But awareness does not necessarily translate into a change of behavior.
BYOD: User Policy Considerations Questions and key points companies should consider when establishing BYOD policies.
Five Mobile Business Intelligence Traps to Avoid Businesses should avoid these pitfalls as they dive into mobile BI deployments.
Top Six Service Desk Concerns and How to Alleviate Them Examining help desk concerns of top IT decision makers through social media conversations.
An eWEEK Property
Copyright 2019 Quinstreet Inc. All Rights Reserved.
Advertiser Disclosure: Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.