Tips for maintaining security while employees are out of the office for the holidays

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Dec 16, 2016
Featured Image

Walking Dead can teach you valuable security lessons

The most terrifying thing about the world of The Walking Dead isn’t "Walkers", it’s other people: Walkers, as they are referred to on the show, are predictable; they’re hungry, and they want to eat your brains. Humans on the other hand, often can and will be unpredictable, and that’s exactly what makes them dangerous. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Tips for maintaining security while employees are out of the office for the holidays
Top 15 security predictions for 2017
Lessons learned from the 7 major cybersecurity incidents of 2016
Don't like Russian cyberspies? Tips to stop state-sponsored hackers
A hefty fine is just part of penalties for the Ashley Madison adultery site
Bye, privacy: Evernote will let its employees read your notes
Here's some questions Congress should ask about the election-related hacks
Yahoo breach means hackers had three years to abuse user accounts

Video/Webcast: Rogue Wave Software

Building the perfect PHP app for the enterprise: Keeping up with PHP

This introductory session lays the foundation for your PHP app and this series. If you have at least one year of PHP experience, this webinar explains these key building blocks for creating and maintaining enterprise-class applications, mobile services, and third-party libraries. Read More

Thumbnail Image

Tips for maintaining security while employees are out of the office for the holidays

As workers are enjoying time away from the office for the holidays, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data.  Read More

Thumbnail Image

Top 15 security predictions for 2017

So here are some of the best guesses about what we will see in 2017 from several dozen vendors and analysts. There are many more than 15 predictions out there, of course, but these are the ones we heard most frequently. Read More

Thumbnail Image

Lessons learned from the 7 major cybersecurity incidents of 2016

Cyber incidents dominated headlines this year, from Russia’s hacking of Democrat emails to internet cameras and DVRs launching DDoS attacks, leaving the impression among many that nothing should be entrusted to the internet. Read More

Thumbnail Image

Don't like Russian cyberspies? Tips to stop state-sponsored hackers

Be wary around random, but legitimate-looking emails popping up in your inbox. A foreign government may be using them to try to hack you. Read More

Thumbnail Image

A hefty fine is just part of penalties for the Ashley Madison adultery site

Adultery dating service submits to 20 years of federal auditing of its information security. Read More

Thumbnail Image

Bye, privacy: Evernote will let its employees read your notes

Evernote is changing its privacy policy to let employees read its customers' notes, and they can't opt out. Read More

Thumbnail Image

Here's some questions Congress should ask about the election-related hacks

U.S. Congress members are all demanding answers over claims that Russia attempted to influence the presidential election with several high-profile hacks. U.S. intelligence agencies are confident that the foreign government was involved, but incoming president Donald Trump remains skeptical. Read More

Thumbnail Image

Yahoo breach means hackers had three years to abuse user accounts

Security researchers are disturbed it took Yahoo three years to discover that details of over 1 billion user accounts had been stolen back in 2013. Read More

White Paper: Bitdefender

What You Need to Know About Ransomware and How Bitdefender Helps you Stay Safe

Modern ransomware is a type of malware that locks and usually encrypts an operating system until the user pays to regain access. The malware can enter a system through a malicious downloaded file, a vulnerability in a network service or a text message. Why is it different from traditional malware? Read more here. Read More

8 tips for managing without authority

When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success.

How to reduce Windows 10's on-disk footprint

Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that.

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.