Archive for March 2016
How to Recognize and Prevent Social Engineering Attacks
Phishing scams make breaking news at a dizzying pace, but there are other ways hackers use social engineering to steal your data. Learn how to prevent the most sophisticated attacks.
Read More8 Reasons Why You Should Change The Way You Think About Cloud Partners
Through our 2015 Trends in Cloud IT research, we found that today’s cloud-enabled organizations use an average of eight cloud applications. In two years, that number more than doubles to 17. How many cloud applications will you run in five years? In 10? Can your IT team handle that kind of rapid cloud application growth?…
Read MoreInformation Security and Pop Culture: How Real-Life Social Engineering Techniques are Used in Movies and Television
Social engineering isn’t reserved for hackers. It’s a common con used in many acclaimed films and television series.
Read MoreReal-Time Messaging: Data Unearths Surprising Findings on Usage, Distraction, and Organizational Impact
Real-time messaging has changed the way employees communicate, mostly for the better. However, there’s surprising data we uncovered that shows another side, which isn’t quite as rosy.
Read MoreHow the IT Guy Became the “It Guy”: The Evolving Portrayal of Tech Professionals in Movies and Television
The “IT nerd” image is hard to shake; Hollywood has plastered it into our collective consciousness for years. We go in-depth to show how IT’s image has evolved.
Read More