Tuesday, February 25, 2014

How to Test the Security Savvy of Your Staff

Computerworld Security: February 25, 2014
===============================================================

How to Test the Security Savvy of Your Staff

How do you know your employees retain what you teach them in company-required
security awareness training? You don't -- unless you regularly test their
security savvy and effectively address their mistakes during post-test follow-up
sessions.
http://cwonline.computerworld.com/t/8864011/823929835/658324/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Ultrium LTO Consortium~~~~~~~~~~~~~~~~~~~~~

The Evolving Role of Disk and Tape

Disk-based solutions for data protection have opened up new storage options for
organizations. The question should not be whether to choose disk or tape, but
rather how to leverage both technologies to deploy a cost-effective
tiered-storage architecture.

http://cwonline.computerworld.com/t/8864011/823929835/658325/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=bafa2ed5

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Apple encryption mistake puts many desktop applications at risk
http://cwonline.computerworld.com/t/8864011/823929835/658326/19/

2. Jonny Evans: Apple's 'Gotofail' bug sucks, but here's 8 ways to stay safe online
http://cwonline.computerworld.com/t/8864011/823929835/658327/20/

3. IT pros rank University of Texas San Antonio best school for cybersecurity
http://cwonline.computerworld.com/t/8864011/823929835/658328/21/

4. U.S. carriers rejected 'kill switch' technology last year
http://cwonline.computerworld.com/t/8864011/823929835/658329/28/

5. Blackphone plans more secure devices, buoyed by Snowden leaks
http://cwonline.computerworld.com/t/8864011/823929835/658330/29/

6. US attorney general calls for data-breach notification law
http://cwonline.computerworld.com/t/8864011/823929835/658331/30/

7. Darlene Storm: 98% of mobile malware targets Android platform
http://cwonline.computerworld.com/t/8864011/823929835/658332/31/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Toshiba~~~~~~~~~~~~~~~~~~~~~

An interactive eGuide: Mobile Computing

The face of mobile computing has changed significantly over the past few years
with the advent of smart phones, tablets, and other mobile devices.

http://cwonline.computerworld.com/t/8864011/823929835/658333/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=218d40b4

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Apple encryption mistake puts many desktop applications at risk

A subtle mistake in how Apple implemented a basic encryption feature that
shields data from snooping also affects many desktop applications that rely on
the code, according to a noted security researcher.
http://cwonline.computerworld.com/t/8864011/823929835/658326/33/

Jonny Evans: Apple's 'Gotofail' bug sucks, but here's 8 ways to stay safe online


Apple's "Gotofail" bug is a big deal because customers were exposed to risk for
a long time. The only positive of this appalling oversight is that it
illustrates why users of any platform should embrace the following security
tips.


http://cwonline.computerworld.com/t/8864011/823929835/658327/34/

IT pros rank University of Texas San Antonio best school for cybersecurity

The University of Texas at San Antonio (UTSA) tops a somewhat unexpected list of
schools that are considered by security practitioners as the best in the country
for cybersecurity courses and degree programs.
http://cwonline.computerworld.com/t/8864011/823929835/658328/35/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: BMC Software~~~~~~~~~~~~~~~~~~~~~

10 Steps to Reducing Mainframe MLC Costs

Monthly license charges (MLC) are rising by 7% or more each year, and account
for 30% of total mainframe costs. Yet managing MLC costs is an inexact science.

http://cwonline.computerworld.com/t/8864011/823929835/658334/36/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=f1d329aa

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

U.S. carriers rejected 'kill switch' technology last year

U.S. cellphone carriers were offered a technology last year that supporters say
would dramatically cut incidents of smartphone theft, but the carriers turned it
down, according to sources with knowledge of the proposal.
http://cwonline.computerworld.com/t/8864011/823929835/658329/37/

Blackphone plans more secure devices, buoyed by Snowden leaks

Blackphone, the Swiss start-up that's launching a smartphone with encrypted
communications, is planning a series of devices around the same idea, one of the
company's co-founders said on Monday.
http://cwonline.computerworld.com/t/8864011/823929835/658330/38/

US attorney general calls for data-breach notification law

Congress should pass a law requiring businesses that have lost customer
information in cyberattacks to notify those affected, U.S. Attorney General Eric
Holder said.
http://cwonline.computerworld.com/t/8864011/823929835/658331/39/

Darlene Storm: 98% of mobile malware targets Android platform


Mobile malware has evolved into a big dirty business run as a major operation
by many cybercrooks instead of lone hackers, but Android is still the most
targeted platform.
http://cwonline.computerworld.com/t/8864011/823929835/658332/40/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8864011/823929835/641183/41/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8864011/823929835/643300/42/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8864011/823929835/604375/43/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8864011/823929835/598565/44/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

A recent survey found that 40% of tech support workers had to remove malware
from devices after employees visited adult content sites. Is this a problem at
your company?

http://cwonline.computerworld.com/t/8864011/823929835/656068/45/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8864011/823929835/156832/46/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8864011/823929835/311619/47/

Facebook: http://cwonline.computerworld.com/t/8864011/823929835/311620/48/

Twitter: http://cwonline.computerworld.com/t/8864011/823929835/311621/49/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8864011/823929835/131135/50/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODY0MDEx&x=c333d41b

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8864011/823929835/72510/51/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8864011/823929835/231613/52/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8864011/823929835/72509/53/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:55 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive