Every day companies are affected by hackers. But few attacks have ever had this type of scope.
While companies rely on peer-to-peer (P2P) file-sharing networks to help employees do their jobs more efficiently, hackers prey on these networks as a means of lifting confidential info.
Are we spending to much on IT? It’s a question many companies wrestle with on a regular basis — and they don’t have to.
Sonia’s an Excel whiz, a certified payroll professional … and likely to be passed over for the perky candidate with a gift for the gab!
While running internal audits has become a fairly common practice, some firms are taking it a step further.
What is your bank doing to keep your cash safe? If you don’t know, now’s a good time to find out — and the more detailed the info, the better.
A simple SMS text sent remotely by any hacker with a little skill and a few tools could wreak havoc on your staffers’ company phones.
All the hype and gossip about President Barack Obama’s BlackBerry addiction got another twist Monday morning when the new president deadpanned to NBC “Today Show’s” Matt Lauer that his new smartphone “has everything. It can turn into a car if I have to make a quick getaway.”
Of course you know 12345 isn’t the best idea for a password. But are the passwords and practices you and your staffers use just as bad?