Security rule No. 1: Assume you're hacked

July 13, 2010
Accept that your company's IT system have been compromised -- then get to work defending them
Read more »

Putting limits on users' privileges

July 06, 2010
Windows UAC and least-privilege products aim to ensure that users have no more permissions than necessary to do their jobs
Read more »

How many enterprise admins is too many?

June 29, 2010
Empowering too many users with high-level Windows admin privileges can lead to severe security headaches
Read more »

Popularity is the biggest hack magnet

June 22, 2010
With few exceptions, widely used software gets hacked more often than unpopular software, regardless of app security
Hacking
Read more »

Unintended cell phone calls put privacy at risk

June 15, 2010
Supersensitive touchscreens can lead to accidentally sharing conversations with the wrong people
Read more »

Fixing the Internet would be easy -- if we tried

June 08, 2010
We have the technology to secure the Internet -- yet it likely won't happen until after a major disaster
Read more »

Unseen security risks lurk in the copy room

June 01, 2010
Web-connected copiers, printers, and fax machines can provide malicious hackers with unfettered access to a trove of data
Read more »

Security forecast: High chance of 'shadow' clouds

May 25, 2010
As with IM and social networking, end-users will bring dangerous cloud computing services into your organization
Read more »

Choose your security battles wisely

May 18, 2010
Winning over management to support security measures requires tact, preparation -- and a willingness to surrender
Security
Read more »

The true extent of insider security threats

May 11, 2010
Rogue employees and clueless users can cause even more damage than the bad guys outside the gate
Read more »
©1994-2014 Infoworld, Inc.