Backup and recovery problems exposed
A Veeam survey of 500 SMBs across the USA and Europe found that they are experiencing significant issues with the cost, complexity and lack of capabilities of their data …
Rogue employees, malware exploits and unauthorized software
While IT security professionals recognize the threat posed by unwitting employees, many still admit to allowing administrative privileges to go unmanaged, making organizations …
Most small businesses can’t restore all data after a cyber attack
Almost one-third of U.S. small businesses surveyed by the Ponemon Institute had a cyber attack in the previous year, and nearly three-quarters of those businesses were not …
Is data fragmentation putting businesses at risk?
IT managers believe that fragmentation of corporate data across their IT infrastructure and an emerging “Shadow IT’ network of user devices or consumer cloud …
Most businesses experienced a mobile security incident
79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs, according to Check Point. The report found mobile security …
Cyberespionage campaign targeting government-affiliated organizations
Kaspersky Lab experts published a new research report about NetTraveler, which is a family of malicious programs used by APT actors to successfully compromise more than 350 …
The rise of the Koobface social networking worm
A new McAfee Labs report shows a significant spike in instances of the Koobface social networking worm and a dramatic increase in spam. McAfee Labs also saw continued …
The enterprise security time bomb
Companies are at serious risk of data security breaches as 38 percent of U.S. office workers admit to storing work documents on personal cloud tools and services, according to …
Employees continue to use risky apps on mobile devices
Risky applications and business applications are being used side-by-side on devices owned by employees that are used for work, according to a survey by the SANS Institute. …
Killer apps: The performance of networked applications
Ipanema Technologies and Easynet Global Services unveiled the results of Killer Apps 2013, a major study into the performance of networked applications. Networking budgets are …
Fighting cybercrime is on the right track
Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …
IT security pros have trouble communicating with executives
A Hanover Research survey of 131 information security professionals revealed key differences between the way executive and non-executive IT professionals communicate with …
Featured news
Resources
Don't miss
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd
- Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282)
- The U.S. Cyber Trust Mark set to launch
- Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers
- Why an “all gas, no brakes” approach for AI use won’t work