Thursday, April 30, 2015

ICYMI: The things end users do that drive security teams crazy

Malware remodeled: New tricks, new suits slamming enterprise resources.

Five security questions you should be asking about the Apple Watch.

CSO Update
April 30, 2015

ICYMI: The things end users do that drive security teams crazy

To protect users from public embarrassment their identities have been withheld in these true stories of failures to follow security protocol. READ MORE

 

Issue highlights

1. INSIDER Malware remodeled: New tricks, new suits slamming enterprise resources

2. Five security questions you should be asking about the Apple Watch

3. Subscribe to CSO's Security Smart newsletter!

4. Tesla attack started with a single phone call

5. CareerBuilder listings used as Phishing platform

6. IDG Contributor Network: For women to avoid 'office housework', work from home

White Paper: LifeLock

Infographic: Breached - How Your Data Can Be Put at Risk

Breaches like the Target breach of 2013 and the recent "Heartbleed" bug are not just an electronic problem. Get up-to-speed on common types of physical and electronic data breaches with this infographic. Learn More

INSIDER

Malware remodeled: New tricks, new suits slamming enterprise resources

Time to beef up layered approaches to stop the new malware hoards at the door. READ MORE

Five security questions you should be asking about the Apple Watch

The Apple Watch isn't due to hit the market until April 24, but many security professionals are already thinking about the security implications of the new generation of wearables that it promises to usher in. READ MORE

Webcast: Citrix | HP

Mobility: The Game-Changer for your Organization

IDG Research shows a majority of companies (59 percent) allow their employees to do work using their own devices either away from their office or at work. In this webcast, hear from two experts on how to make some critical decisions about optimizing your mobile workforce. Learn More

Subscribe to CSO's Security Smart newsletter!

From the editors of CSO magazine, Security Smart is a quarterly newsletter ready for distribution to your employees—saving you precious time on employee education! The compelling content combines personal and organization safety tips, making it applicable to many facets of employees' lives. READ MORE

Tesla attack started with a single phone call

Last weekend, Tesla Motors had their website, and Twitter accounts hijacked by individuals looking to play a joke. They used their access to deface the company's website and spam a computer repair shop in Illinois, posting their number along with a promise of a free Tesla to callers. READ MORE

White Paper: Ipswitch, Inc

10 Monitoring Tips for Microsoft Apps and Environments

Here are 10 tips that will help boost the performance of your Microsoft applications and underlying environments. Learn More

CareerBuilder listings used as Phishing platform

Researchers at Proofpoint recently discovered a Phishing campaign that originated form select job postings on CareerBuilder. READ MORE

IDG Contributor Network: For women to avoid 'office housework', work from home

It can be easy to see how parents, particularly working mothers, might realize benefits of working from home. But there are other, less obvious reasons that women in tech can reap big rewards by choosing to telecommute. READ MORE

Resource compliments of: CSO Security Smart

Security Smart: The Employee Security Awareness Newsletter

Security Smart is a quarterly security awareness newsletter ready for distribution to your employees— saving you precious time on employee education! The compelling content combines personal and organization safety tips so is applicable to many facets of employees' lives. Click to continue

Top 5 Stories

  1. Credit card terminals have used same password since 1990s, claim researchers
  2. How the top social networks compare on privacy -- in one handy chart
  3. Tesla attack started with a single phone call
  4. 166816 (Z66816): A post-RSA Conference recap
  5. 6 hard truths security pros must learn to live with

 

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

 

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:35 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive