5 tips to stay ahead of ransomware threats

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Dec 14, 2016
Featured Image

Dec. 2016 Patch Tuesday: Microsoft releases 12 security bulletins, 6 rated critical

Congrats for making it through another year of patching Windows! There are 12 this month, 6 rated critical and some which had been publicly disclosed. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

5 tips to stay ahead of ransomware threats
U.S. DOT advances mandate for vehicle-to-vehicle communications technology
Netgear starts patching routers affected by a critical flaw
Zen and the art of security
Facebook helps companies detect rogue SSL certificates for domains
Cybersecurity skills aren’t taught in college
Google's taking Brillo into smart homes with Android Things
6 network and security trends you can expect in 2017

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

5 tips to stay ahead of ransomware threats

Ransomware is on the rise and promises to be an even bigger threat in 2017. Here are five ways to protect against attacks. Read More

Thumbnail Image

U.S. DOT advances mandate for vehicle-to-vehicle communications technology

Looking to put a high-tech solution to a deadly problem the U.S. Department of Transportation has issued a proposed rule to standardize the development and implementation of vehicle communications technologies in cars and trucks. The idea is to enable a multitude of new crash-avoidance applications that could save lives by preventing “hundreds of thousands of crashes every year by helping vehicles “talk” to each other,” the DOT stated. Read More

Thumbnail Image

Netgear starts patching routers affected by a critical flaw

Networking device manufacturer Netgear released firmware updates for several router models in order to patch a critical vulnerability that's publicly known and could be exploited by hackers. Read More

Thumbnail Image

Zen and the art of security

Achieving security Zen is a long discipline of unlearning what you’ve learned and accepting countless paradoxes. Read More

Thumbnail Image

Facebook helps companies detect rogue SSL certificates for domains

Facebook has launched a tool that allows domain name owners to discover TLS/SSL certificates issued without their knowledge. Read More

Thumbnail Image

Cybersecurity skills aren’t taught in college

Cybersecurity threats are increasing each year, but businesses report shortage of qualified candidates coming out of undergraduate programs. Preparing the next generation of cybersecurity experts won't be a quick fix, so business will need to get strategic. Read More

Thumbnail Image

Google's taking Brillo into smart homes with Android Things

Android is headed to the internet of things in the form of Android Things, an operating system that grew out of Project Brillo and will be able to get updates directly from Google. Read More

Thumbnail Image

6 network and security trends you can expect in 2017

Security and network trends for 2017 include the evolution of malware, IoT will contribute to security concerns, and AI and machine learning will be applied to security. Read More

White Paper: GlobalSCAPE

Be Afraid of Your Shadow: What is 'Shadow IT' and How to Reduce It

Are you making it too easy for hackers to infiltrate your system? If your employees are using unsanctioned devices and applications, then the answer is yes! Unsanctioned devices and applications can leave your IT infrastructure and data far more vulnerable to being exploited by cybercriminals. Unfortunately, it's become easier than ever for employees to access rogue applications, much to the chagrin of busy IT staff. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

2016’s notable deaths in technology, science & inventions

7 ways new sys admins can boost career trajectories Read More

Most-Read Stories

1. AT&T to cough up $88M for ‘cramming’ mobile customer bills
2. Say goodbye to MS-DOS command prompt
3. US-CERT: Stop using your remotely exploitable Netgear routers
4. 19 free cloud storage options
5. Serverless: The next step in cloud computing’
6. 7 hiring trends for 2017
7. Cisco whacks its Secure Access Control System
8. Clickbait and the Avaya feeding frenzy
9. Apache Zeppelin open-source analytics startup reveals new name, fresh funding
10. 7 free tools every network needs
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.