Five tips to be ‘security smart’ this tax season

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Mar 20, 2017
Featured Image
INSIDER

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Five tips to be ‘security smart’ this tax season
Cobol plays major role in U.S. government breaches
Want good cyber insurance? Read the fine print
Future of tech policy murky under Trump administration
Fragmentation: the silent killer in security management
Experts divided on value of Cyber National Guard
Hire a DDoS service to take down your enemies
Inside the Russian hack of Yahoo: How they did it
Ask.com serves as a conduit for malware - again

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

Five tips to be ‘security smart’ this tax season

Every year there are scams to dupe you into filing your taxes with the wrong collector Read More

Thumbnail Image

Cobol plays major role in U.S. government breaches

New research is turning on its head the idea that legacy systems -- such as Cobol and Fortran -- are more secure because hackers are unfamiliar with the technology. Read More

Thumbnail Image

Want good cyber insurance? Read the fine print

Given the explosive growth of online threats, cyber insurance is becoming mandatory for most organizations. But the field is still new enough that buying an effective policy takes a lot of due diligence and attention to the fine print. Read More

Thumbnail Image

Future of tech policy murky under Trump administration

Insiders praise administration's focus on infrastructure and deregulation, but worries linger over immigration policies. Read More

Thumbnail Image

Fragmentation: the silent killer in security management

Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and technologies. Adam Vincent, co-founder and CEO, ThreatConnect, describes best practices for overcoming security fragmentation. Read More

Thumbnail Image

Experts divided on value of Cyber National Guard

This past weekend at SXSW, two Congressmen suggested that the U.S. create a cybersecurity reserves system, similar to the National Guard, but the idea has received a mixed welcome from the cybersecurity community Read More

Thumbnail Image

Hire a DDoS service to take down your enemies

With the rampant availability of IoT devices, cybercriminals offer denial of service attacks to take advantage of password problems. Read More

Thumbnail Image

Inside the Russian hack of Yahoo: How they did it

One mistaken click. That's all it took for hackers aligned with the Russian state security service to gain access to Yahoo's network and potentially the email messages and private information of as many as 500 million people. Read More

Thumbnail Image

Ask.com serves as a conduit for malware - again

Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same attack methods. Read More

White Paper: Insight

Best Practices For Securing And Empowering A Mobile Workforce

Today's employees want the ability to work anywhere, anytime. But in order to give your team reliable, flexible options to optimize mobile workforce productivity, your business needs a strategy to manage device security. Download the complimentary Forrester report to learn what steps you can take to enable a successful Bring Your Own Device (BYOD) policy. Read More

CIO Insider

1. The 10 Windows group policy settings you need to get right
2. How to manage introverts and extroverts
3. Why the subscription economy is the future of business
4. Driving digital strategy with customer journey maps
5. 7 (more) security TED Talks you can’t miss

Editor's Picks

1. Why GE is winning the war for tech talent
2. More than a third of tech workers are underpaid
3. Google splits Hangouts in half
4. 10 tips for making self-evaluations meaningful
5. How to know if your smart TV can spy on you
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.