7 tips to strengthen online security

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Mar 10, 2017
Featured Image

Wikileaks’ dump of CIA exploits exposes enterprises to new risks

Corporations concerned about the release of thousands of CIA documents detailing hacks against Apple iOS and Mac OSX, Google’s Android, Microsoft’s Windows, Linux and Solaris need to conduct a fresh round of risk assessment that takes the new revelations into account. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

7 tips to strengthen online security
Why email is safer in Office 365 than on your Exchange server
Honeypot catches social engineering scams on social media
CIA-made malware? Now antivirus vendors can find out
Consumers are wary of smart homes that know too much
Consumer Reports to grade tech products on security, privacy
US Senate resolution aims to roll back privacy rules for ISPs
US senator probes into CloudPets smart toy hack
What's the value in attack attribution?
CIA false flag team repurposed Shamoon data wiper, other malware

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence. Read More

Thumbnail Image
INSIDER

Why email is safer in Office 365 than on your Exchange server

Beyond blocking spam and virus-laden messages, cloud services can determine whether links are safe to visit and whether you’re protecting the right information. Read More

Thumbnail Image

Honeypot catches social engineering scams on social media

Research company investigates 40,000 fake accounts to find impersonator tactics.  Read More

Thumbnail Image

CIA-made malware? Now antivirus vendors can find out

Thanks to WikiLeaks, antivirus vendors will soon be able to figure out if you have been hacked by the CIA. Read More

Thumbnail Image

Consumers are wary of smart homes that know too much

Nearly two-thirds of consumers are worried about home IoT devices listening in on their conversations, according to a Gartner survey released Monday. Read More

Thumbnail Image

Consumer Reports to grade tech products on security, privacy

Consumer Reports, a major source for gadget reviews in the U.S., plans to start rating tech products on data security and privacy. Read More

Thumbnail Image

US Senate resolution aims to roll back privacy rules for ISPs

A resolution introduced in the U.S. Senate on Tuesday aims to roll back privacy rules for broadband service providers that were approved by the Federal Communications Commission in October. Read More

Thumbnail Image

US senator probes into CloudPets smart toy hack

A U.S. senator is probing reports of a breach of data from smart toys from Spiral Toys, writing to the company’s CEO a letter with ten questions about the issue, including about the company’s security practices. Read More

Thumbnail Image

What's the value in attack attribution?

Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise? Read More

Thumbnail Image

CIA false flag team repurposed Shamoon data wiper, other malware

The U.S. Central Intelligence Agency documents published by WikiLeaks Tuesday shows that one of the agency's teams specializes in reusing bits of code and techniques from public malware samples. Read More

White Paper: Veeam Software Corporation

Data Availability Without Limits

In this white paper, you'll learn about the requirements driving the need for increased availability, less complexity and improved reliability. Then you'll see how Veeam software and Hewlett Packard Enterprise solutions can help you meet your availability objectives, future-proof your data center investment, and gain capabilities that provide data protection without limits to meet your always-on business needs. Read More

CIO Insider

1. Follow these career roadmaps to 7 hot IT jobs
2. 8 project management skills in high demand
3. Battle of the clouds: Amazon Web Services vs. Microsoft Azure vs. Google Cloud Platform
4. The top 6 Governance, Risk and Compliance certifications
5. The CIO's guide to smarter vendor negotiation

Editor's Picks

1. First impressions of Samsung's Galaxy Book with Windows 10
2. Comparing agile project management frameworks
3. Edge computing will blow away the cloud
4. 10 mobile marketing trends to watch in 2017
5. 15 unfilled tech jobs that cost the U.S. billions
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.