Top 12 IT Security Stories of 2012
The holidays are nearly here and 2012 is on the way out. It's time to reflect on some of the most popular security stories and tips of the year as we prepare for 2013.
Thu, December 20, 2012
CIO — As 2012 winds down, it's time to take a look at the year in security. Security and data breaches made plenty of headlines in 2012. Here are 12 of the most-read security articles of 2012.
Cybercriminals are increasingly using drive-by downloads to distribute malware without end users knowing something bad has just landed on their machine--until it's too late. Here are six ways IT departments can protect end users from the productivity sink and potential data loss that drive-by downloads create.
As email phishing operations have grown more sophisticated and convincing, it's harder for even savvy corporate email users to determine whether an email is authentic or fake. Here, CIO.com presents an example of a particularly convincing phishing email. We asked, Daniel Peck, a research scientist with email security company Barracuda Networks, to offer tips on how to spot a scam.
When hackers attack a company's systems and steal your personal data, what risk does that pose to you and other victims? How much is your name and email address worth to cybercriminals anyway? To find out what's really at stake, CIO.com asked security experts six key questions about data security breaches.
A company's domain name is one of its most valuable assets, yet businesses do little to protect them from being hijacked. As DNS hijacking becomes more prevalent, IT leaders need to understand how they can protect their companies from the damages domain hijacking wreaks. Here are four tips.
The complex and ever-changing security landscape can befuddle small businesses, and the plain truth is that there is no silver security bullet. Small businesses would be well-advised to deploy a multi-faceted security strategy. Here are eight must-have checklist items.
Small USB flash drives can cause big security headaches. Learn how four very different organizations have managed to balance the need to allow employees to transfer files for legitimate business purposes with the need to prevent data leaks.
Your sensitive data is only as secure as the weakest link in your organization, and in many cases the weak link is your employees. A properly established security awareness and training program can pay huge dividends.