News and Articles About IT Security
Are you overlooking this risk factor, which last year caused 25 percent of federal agencies' security breeches?
Turns out you may be at risk if you're running Windows 8.1 on a Samsung computer.
There are three types of rogue employees: The Innovative, The Bad and The Lazy. Here's how you can identify and stop them in their tracks.
Set up a mock phishing email among your employees to see who takes the bait -- and who's the most gullible.
From "Mr. Feet on the Ground" to "Ms. Head in the Cloud," these employee personalities help you find the holes in your system.
Increase employees' productivity and protect your company's data with these tips for building a safe 'bring your own device' plan.
While the 'Heartbleed' bug is causing pandemonium in the online world, individuals need to stay calm and protect their personal information.
With business continuing its shift from the desktop to smartphones and tablets, more than half of all companies now have sensitive information stored on mobile devices.
If you're still using Microsoft's old operating system after it ceases support, you'll be more vulnerable to viruses, hacks and other issues.
Take these steps to protect your personal and professional information from hackers.
From defending your network to protecting your data, free software can provide comprehensive protection for your company's computer systems.
From encrypting files to beefing up passwords, consider these steps for better protecting sensitive company data.
More companies are accepting mobile payments. But failing to protect credit-card data could risk hefty penalties and fines.
From password management to securing your network, these tools can help keep your business information from landing in the wrong hands.