Must-have Information for IT & IT Security Pros
Businesses unable or unwilling to tackle healthcare security and compliance on their own should look for the right cloud communications provider that can shoulder this burden.read more
One of the big potential problems of cloud-based and hosted services: in the end, if the data isn’t fully under your control, you’re never sure who may have access to it.
In the small town of Greenland, New Hampshire on the day after Christmas 2013, a town employee opened an email indicating that they had received a voice message from AT&T…and infected the computers at the Town Hall with malicious software known as CryptoLocker.
Even if your organization has done all the right things and still been breached, you still have to communicate to your customers about an awkward and unpleasant topic.
In this podcast, Editorial Director Jim Rapoza talks to Aberdeen VP and Research Fellow IT Security, Derek Brink, about several recent and high profile data breaches, cyber fraud rings, and the changing approaches that cyber criminals are taking to perpetrate crime.
As we celebrate the 25th anniversary of the creation of the World Wide Web, let’s take a little bit of time to look back at the history of this transformative technology, and also look forward to what the next few years hold in store.