IT Security: Page 2
How to Create Security Awareness at Your Company
Set up a mock phishing email among your employees to see who takes the bait -- and who's the most gullible.
5 Employee Types You Should Recognize to Enhance Your IT Security Policies
From "Mr. Feet on the Ground" to "Ms. Head in the Cloud," these employee personalities help you find the holes in your system.
6 Steps to Create an Effective BYOD Plan (Infographic)
Increase employees' productivity and protect your company's data with these tips for building a safe 'bring your own device' plan.
4 Ways to Protect Yourself From the 'Heartbleed' Bug
While the 'Heartbleed' bug is causing pandemonium in the online world, individuals need to stay calm and protect their personal information.
Our Collective Mobile Security Blind Spot
With business continuing its shift from the desktop to smartphones and tablets, more than half of all companies now have sensitive information stored on mobile devices.
Seriously, It's Really Time to Upgrade From Windows XP
If you're still using Microsoft's old operating system after it ceases support, you'll be more vulnerable to viruses, hacks and other issues.
New York Times Hacked: 3 Tips for Avoiding Email Scams
Take these steps to protect your personal and professional information from hackers.
Free Tools for Improving Online Security
From defending your network to protecting your data, free software can provide comprehensive protection for your company's computer systems.
7 Tips for Upgrading IT Security
From encrypting files to beefing up passwords, consider these steps for better protecting sensitive company data.
How to Protect Customer Data When Using Credit-Card Plug-ins for Smartphones
More companies are accepting mobile payments. But failing to protect credit-card data could risk hefty penalties and fines.
Three Tech Tools for Keeping Sensitive Business Data Safe
From password management to securing your network, these tools can help keep your business information from landing in the wrong hands.
How to Protect Your Business from Malware in Custom Apps
An expanding network of cybercriminals is taking aim at the hidden flaws lurking inside the custom-created apps on your company's website. Here's how to safeguard application security for your customers -- and your business.
How to Move Your Business Data into the Cloud -- Safely
The process of migrating to the cloud can loom like a thunderhead over a business. Here's advice on a safer path.
Six Tips for Surviving a Cyber Security Threat
How to thwart threats to your company's computer system.
Cybercriminals: A Look at Their World and Their Threat to Business
A disturbing look at the far-reaching depths of the cybercriminal network--and what you can do to make sure the bad element stays out of your company.