The holidays are nearly here and 2012 is on the way out. It's time to reflect on some of the most popular security stories and tips of the year as we prepare for 2013. As 2012 winds down, it’s time to take a look at the year in security. Security and data breaches made plenty of headlines in 2012. Here are 12 of the most-read security articles of 2012. 1. 6 Ways to Defend Against Drive-by DownloadsCybercriminals are increasingly using drive-by downloads to distribute malware without end users knowing something bad has just landed on their machine–until it’s too late. Here are six ways IT departments can protect end users from the productivity sink and potential data loss that drive-by downloads create. 2. How to Tell If an Email Is a Phishing ScamAs email phishing operations have grown more sophisticated and convincing, it’s harder for even savvy corporate email users to determine whether an email is authentic or fake. Here, CIO.com presents an example of a particularly convincing phishing email. We asked, Daniel Peck, a research scientist with email security company Barracuda Networks, to offer tips on how to spot a scam. 3. Are You at Risk? What Cybercriminals Do With Your Personal DataWhen hackers attack a company’s systems and steal your personal data, what risk does that pose to you and other victims? How much is your name and email address worth to cybercriminals anyway? To find out what’s really at stake, CIO.com asked security experts six key questions about data security breaches. 4. 4 Ways to Prevent Domain Name HijackingA company’s domain name is one of its most valuable assets, yet businesses do little to protect them from being hijacked. As DNS hijacking becomes more prevalent, IT leaders need to understand how they can protect their companies from the damages domain hijacking wreaks. Here are four tips. 5. How to Build Multiple Layers of Security for Your Small BusinessThe complex and ever-changing security landscape can befuddle small businesses, and the plain truth is that there is no silver security bullet. Small businesses would be well-advised to deploy a multi-faceted security strategy. Here are eight must-have checklist items. 6. How to Prevent Thumb Drive Security DisastersSmall USB flash drives can cause big security headaches. Learn how four very different organizations have managed to balance the need to allow employees to transfer files for legitimate business purposes with the need to prevent data leaks. 7. How to Secure Data by Addressing the Human ElementYour sensitive data is only as secure as the weakest link in your organization, and in many cases the weak link is your employees. A properly established security awareness and training program can pay huge dividends. 8. Will Tech Industry Ever Fix Passwords?What LinkedIn and other recent breaches tell us about widespread security risks as we embrace social media and cloud applications in the enterprise. 9. Facebook Timeline Scams Prey on Wishful Thinking If you’re not a fan of the new Facebook Timeline design, beware of bogus Facebook groups and pages promising a return to the old design. 10. Mobile Malware: Beware Drive-by Downloads on Your Smartphone Drive-by downloads are coming to your smartphone, and they’re harder to detect than traditional PC-based versions. Here’s how you can protect yourself, your users and your enterprise from mobile drive-by downloads. 11. How to Secure Sensitive Files and DocumentsMuch of an organization’s most sensitive information resides in unstructured files and documents that are commonly subject to data loss and leakage–especially in today’s mobile, Web-based world. IT pros must develop an approach to securing these documents that gives the business the control it needs without stymying employees’ productivity. 12. How to Defend Against MalnetsThe number of malnets has jumped 300 percent in the past six months, according to security firm Blue Coat Systems. While they are nearly impossible to kill, there are steps you can take to protect your organization. Thor Olavsrud covers IT Security, Big Data, Open Source, Microsoft Tools and Servers for CIO.com. Follow Thor on Twitter @ThorOlavsrud. Follow everything from CIO.com on Twitter @CIOonline and on Facebook. Email Thor at tolavsrud@cio.com Related content feature Red Hat embraces hybrid cloud for internal IT The maker of OpenShift has leveraged its own open container offering to migrate business-critical apps to AWS as part of a strategy to move beyond facilitating hybrid cloud for others and capitalize on the model for itself. By Paula Rooney May 29, 2023 5 mins CIO 100 Technology Industry Hybrid Cloud feature 10 most popular IT certifications for 2023 Certifications are a great way to show employers you have the right IT skills and specializations for the job. These 10 certs are the ones IT pros are most likely to pursue, according to data from Dice. By Sarah K. White May 26, 2023 8 mins Certifications Careers interview Stepping up to the challenge of a global conglomerate CIO role Dr. Amrut Urkude became CIO of Reliance Polyester after his company was acquired by Reliance Industries. He discusses challenges IT leaders face while transitioning from a small company to a large multinational enterprise, and how to overcome them. By Yashvendra Singh May 26, 2023 7 mins Digital Transformation Careers brandpost With the new financial year looming, now is a good time to review your Microsoft 365 licenses By Veronica Lew May 25, 2023 5 mins Lenovo Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe