Some IT security attacks start from the most innocent mobile apps and in ways that let cyber-criminals simply pick up confidential communications without having to hack into anything at all.
Does it sound strange that many organisations believe they are exposed to major problems with Internet of Things device security, yet few of them have taken any measures to resolve those problems?
Small businesses using low-end routers for their networks may be highly vulnerable to hackers.
Malware (Sneakyware) is the software that gets into your system and causes havoc, unless you detect it and neutralize first.
IT has no shortage of four-letter words. It’s not clear what the latest variations on the “BYO” or “bring your own” theme add.
Don’t take this title too literally. Ransomware, the malware that extorts money from victims to prevent a disaster, will surely continue to be active, at least in the short term.
It’s always an editorial dilemma – Do we start with the event with the biggest business continuity impact? The event that was the most unbelievable? For the 2016 Business Continuity Review, we have some difficult choices, including the massive cyberattack of the toasters, the most powerful man in the world (soon) trying to carve up the Internet, and a smartphone threatening the health of a national economy.
Einstein, move over. There is a new universal constant now, one that governs all IT-driven security activity, which by now is almost everything that goes on in the known world.
The advanced persistent threat or APT is the up and coming menace to IT systems today.
As free and freely available software that has helped millions of individuals and enterprises easily establish a presence on the web, WordPress has a reputation for being well-designed and reliable.
A well-paid, but heavy responsibility with a built-in ejector seat is one way of looking at the CISO position.
This is a little like asking “how long is a piece of string”, except that in this case the string may already be a lot shorter than you imagined. Passwords are often the bane of the IT helpdesk.