Protecting the enterprise against mobile threats

Email not displaying correctly? View it in your browser.

CSO

CSO Continuity & Recovery

Mar 15, 2017
Featured Image

Disaster recovery: How is your business set up to survive an outage?

Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Protecting the enterprise against mobile threats
How to respond to a cyber attack
Why awareness needs to teach scam detection and reaction
7 tips to strengthen online security
Honeypot catches social engineering scams on social media
What's the value in attack attribution?

White Paper: OpenText

10 Strategies to Navigate the Shift from ECM to Content Services

Read this AIIM ebook to get a list of action items that will help you make the transition to content services. Read More

Thumbnail Image

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though? Read More

Thumbnail Image

How to respond to a cyber attack

Following a breach, organizations should focus on mitigating damage and data loss and providing information to law enforcement. Partner at Ballard Spahr, LLP and former Assistant U.S. Attorney Ed McAndrew and Guidance Software President and CEO Patrick Dennis have compiled best practices for preparing and responding to a cyber-attack and working with law enforcement. Read More

Thumbnail Image

Why awareness needs to teach scam detection and reaction

Most awareness programs teach users how to behave. Ira Winkler argues training needs to go further so people know what to do if they do fall victim to fraud. Read More

Thumbnail Image

7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence. Read More

Thumbnail Image

Honeypot catches social engineering scams on social media

Research company investigates 40,000 fake accounts to find impersonator tactics.  Read More

Thumbnail Image

What's the value in attack attribution?

Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise? Read More

Research/Infographic: OpenText

Infographic: Scale Mountains of ECM Challenges

Take a look at this infographic to learn how Enterprise Information Management solutions can help you make better decisions faster, gain competitive advantage, speed time-to-value, and empower your organization. Read More

Top 5 Stories

1. Spammers expose their entire operation through bad backups
2. How to destroy angels
3. Danes targeted by malware spread through Dropbox
4. After CIA leak, Intel Security releases detection tool for EFI rootkits
5. 7 (more) security TED Talks you can’t miss

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Continuity & Recovery as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.