Tuesday, August 19, 2014

4 small business security lessons from real-life hacks

Survey: Most hackers do it for the lulz | Google broadens its malware sleuthing to sniff out deceptive downloads

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


4 small business security lessons from real-life hacks
Here are four tips for preventing social engineering and DDoS hacks from ruining your business. Read More


RESOURCE COMPLIMENTS OF: CSO Perspective

Defending Against the Pervasive Attacker: CSO Conference
Attend the Boston-area CSO Perspectives Conference on Tuesday, September 16 at the Sheraton Framingham Hotel. Learn about the latest strategies to defend against today's pervasive attacker, and find out what other organizations are doing to create successful and proactive defenses. Register now.

WEBCAST: IBM Corporation

Desktop virtualization market trends
You've probably heard about desktop virtualization -- and some of its benefits – things like tighter security, streamlined management and lower costs. But would desktop virtualization be right for your company? Could you expect to reap all those benefits? And how quickly would you gain a return on investment? View Now

Survey: Most hackers do it for the lulz
What motivates hackers to wreak havoc on security systems and steal sensitive data? According to a new survey, most hackers do it for kicks, and few think they'll get caught. Read More

Google broadens its malware sleuthing to sniff out deceptive downloads
Google is expanding its safe browsing technology to notify Web users of downloads that appear benign, but actually make unwanted changes to their computers. Read More

The biggest iPhone security risk could be connecting one to a computer
Apple has done well to insulate its iOS mobile operating system from many security issues, but a forthcoming demonstration shows it's far from perfect. Read More

Heartbleed exposes weaknesses in hardware design
Heartbleed may have been a software bug, but it highlighted glaring weaknesses in existing hardware architectures, which remain vulnerable to memory-bound attacks. Read More


: KnowBe4

Why Security Awareness Training? Ransomware, That's Why...
Since September 2013, several ransomware strains are attacking end-users. You cannot just rely on your filters, you also have to train your end-users. Get a Quote for your organization now and your users trained ASAP. If your files get encrypted due to human error after your user steps through our training, KnowBe4 will pay the crypto-ransom. Learn more >>

Microsoft's strategy on identity management aimed squarely at cloud-based services
The most recent example is Microsoft Enterprise Mobility Suite, which includes the type of software-based "containers" for securing applications that can be found in competing mobile application management software from MobileIron, AirWatch, and others. Read More

British spy agency scanned for vulnerable systems in 32 countries, German paper reveals
Heise Online reveals top-secret details about the GCHQ's 'Hacienda' program. Read More

Schneier: Cyber-retaliation like that exposed by Snowden report a bad idea
It's too hard to know for sure who's behind attacks, he says. Read More

How risky will it be to run old IE after Microsoft's 2016 patch stoppage?
Microsoft's decision to stop patching older versions of Internet Explorer in 17 months may not be as big a show-stopper as many assume. Read More

Supervalu breach shows why move to smartcards is long overdue
U.S. remains one of the last developed nations to use magnetic stripe cards. Read More


BOOK GIVEAWAYS:

We've got 5 copies of each of these new books to give away to some lucky ITworld readers. Enter now for your chance to win!

The Official Ubuntu Book, 8th Ed.

Essential Mobile Interaction Design

DON'T MISS...

Why many programmers don't bother joining the ACM

Top 25 free tools for every Windows desktop

10 amazing (and bizarre) drone discoveries

Just their type: 10 keyboards beloved by programmers

11 colorful characters seen at Comic-Con International 2014


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.