IT Security

News and Articles About IT Security

Who Watches the Watchmen?
Cloud Technology

Who Watches the Watchmen?

Agentless IT technology does its job without sticking around longer than it's needed.
Ashley Leonard
Putting Your Business at Risk is a Communications Channel You'd Never Guess: Paper
Data Breach

Putting Your Business at Risk is a Communications Channel You'd Never Guess: Paper

Are you overlooking this risk factor, which last year caused 25 percent of federal agencies' security breeches?
Thomas Tedford
Samsung Caught Blocking Windows Security Updates
IT Security

Samsung Caught Blocking Windows Security Updates

Turns out you may be at risk if you're running Windows 8.1 on a Samsung computer.
Identify and Stop Rogue Employees Before They Become a Security Threat
Security

Identify and Stop Rogue Employees Before They Become a Security Threat

There are three types of rogue employees: The Innovative, The Bad and The Lazy. Here's how you can identify and stop them in their tracks.
Troy Moreland
How to Create Security Awareness at Your Company
Cybersecurity

How to Create Security Awareness at Your Company

Set up a mock phishing email among your employees to see who takes the bait -- and who's the most gullible.
Robert Siciliano
5 Employee Types You Should Recognize to Enhance Your IT Security Policies
Security

5 Employee Types You Should Recognize to Enhance Your IT Security Policies

From "Mr. Feet on the Ground" to "Ms. Head in the Cloud," these employee personalities help you find the holes in your system.
Tom Smith
6 Steps to Create an Effective BYOD Plan (Infographic)
Security

6 Steps to Create an Effective BYOD Plan (Infographic)

Increase employees' productivity and protect your company's data with these tips for building a safe 'bring your own device' plan.
Nina Zipkin
4 Ways to Protect Yourself From the 'Heartbleed' Bug
Office Tech

4 Ways to Protect Yourself From the 'Heartbleed' Bug

While the 'Heartbleed' bug is causing pandemonium in the online world, individuals need to stay calm and protect their personal information.
Chris Hutchison
Our Collective Mobile Security Blind Spot
Technology

Our Collective Mobile Security Blind Spot

With business continuing its shift from the desktop to smartphones and tablets, more than half of all companies now have sensitive information stored on mobile devices.
Jason Ankeny
Seriously, It's Really Time to Upgrade From Windows XP
Office Tech

Seriously, It's Really Time to Upgrade From Windows XP

If you're still using Microsoft's old operating system after it ceases support, you'll be more vulnerable to viruses, hacks and other issues.
Richard Thompson
New York Times Hacked: 3 Tips for Avoiding Email Scams
Technology

New York Times Hacked: 3 Tips for Avoiding Email Scams

Take these steps to protect your personal and professional information from hackers.
Jason Fell
Free Tools for Improving Online Security
Technology

Free Tools for Improving Online Security

From defending your network to protecting your data, free software can provide comprehensive protection for your company's computer systems.
Riva Richmond
7 Tips for Upgrading IT Security
Technology

7 Tips for Upgrading IT Security

From encrypting files to beefing up passwords, consider these steps for better protecting sensitive company data.
Jason Fell
How to Protect Customer Data When Using Credit-Card Plug-ins for Smartphones
Technology

How to Protect Customer Data When Using Credit-Card Plug-ins for Smartphones

More companies are accepting mobile payments. But failing to protect credit-card data could risk hefty penalties and fines.
Mikal E. Belicove