Target, Home Depot, and Tesco have all fallen prey to massive data breaches. What can we learn from these incidents? It all starts with changing your approach to security training. By focusing on behaviors instead of awareness, you can implement security training that’ll drastically reduce the chances of being the next data breach headline.
Phishing scams are getting more sophisticated on a daily basis, thus making them harder to detect and avoid. If you aren’t well-versed in the latest phishing scams, here are some important tips for you.
Google Cloud Next ’17 offered a window into some of the brightest minds in tech, but what does it all mean for your organization?
Here’s what members of our new Slack community, BetterIT, asked during our first-ever security AMA. BetterIT is a community for leading IT professionals to share ideas, discuss best practices, and talk about the solutions they use every day.
So you’ve provisioned your new user in Google Apps, set him up with a shiny new account, and added him to the right groups and OU. Think your onboarding job is done? Not so fast. To really set up your users for success, there’s one more step you should take.
When new hires show up at the office on their first day, they want to hit the ground running. Here are five critical steps for provisioning and onboarding so that you keep your organization secure and set up your users for success.
Every day, individuals and businesses alike are becoming victims of ransomware, a form of malware that captures your computer’s data and holds it captive until you pay the assigned ransom. …
In 2015, CEOs lost $2.3 billion from phishing attacks, according to the FBI. As an executive, do you know how to identify a phishing email?
If you’re not organized, the process of offboarding departing employees can frazzle even the most seasoned IT professional. Here’s a Google Apps deprovisioning checklist with best practices to help mitigate risk, avoid critical errors, and ensure a smooth, hiccup-free transition.
As the Pokémon GO frenzy continues to sweep the nation, and amidst news that the game gets full access to your Google account, we wanted to see how IT professionals are handling this potential security risk at work. To find out, we asked our readers to take a quick 2-minute poll yesterday. Here are the results.