Organizations need to set up clear guidelines on how employees can use company platforms and how data needs to be managed.
Latest from Natalie Gagliordi
PhishMe aims to help companies thwart phishing attacks and other threats to business networks through consistent employee training.
Wal-Mart may be single-handedly moving the RFID industry along with its ambitious project, but those 100 suppliers who have to meet the directive set by the massive retailer sure don't look convinced.
"Microsoft's overriding goal should be to eliminate the need for AV anti-virus and AS anti-spyware products, not simply to enter the market with lookalike products at lower prices" Microsoft's security announcements this week have scared the bejesus out of independent anti-spyware companies, but they can take some comfort in the fact thatthe companydoesn'tseem to know exactly what it will deliver and how, and how it fits in its overall strategy.
A year ago, 54% of security spending was aimed at keeping viruses, worms, spam, spyware and other cyber threats outside the perimeter; now it’s at 33%. Meanwhile, authentication and encryption have gained to account for over one quarter of security projects, a big jump from just 7% a year ago.
If you haven't checked it out yet, our sister site, TechRepublic, is experimenting with blogs and tagging with both internal employees and community users contributing posts.
A BT Trax analysis of site data since the start of the year shows that Sophos is number one in overall reader consideration for email security, achieved from a modest asset base of 4% of resources in our IT Directory. Webroot and CipherTrust are a close 2nd & 3rd from smaller asset bases.
Meta Group reports that it has seen a jump in the number of inquires related to database security and compliance throughout 2004. It looks like most large organizations are confused over how to react to the tidal wave of regulation that has given them a sense of urgency to drop everything and tackle data privacy.
One of the most interesting findings from ZDNet's annual study of enterprise security is the degree to which organizations have matured with respect to implementing formal plans for defense. Take a look at the data on the percentage of respondent organizations that have a comprehensive security plan in place.
The exploit attempt targeted the Visual Basic Scripting for Applications feature in Microsoft Word.