Please turn on your JavaScript for this page to function normally.
The state of document-centric security

The growing popularity of consumer-grade, browser-based file sharing applications, such as YouSendIt and Dropbox, has improved productivity within the enterprise, but at what …

Record number of phishing websites in the wild

The number of brands targeting by phishing attacks sustained an all-time high of 382 in February and March, while cybercrime gangs deployed a record number of phishing …

67,000 phones to be lost or stolen during the Olympics

Numbers of smartphones and other portable networked devices have exploded over the past few years. As a result, this year’s Games will see the largest-ever risk of …

Privacy commitment key to selection of cloud providers

Attracted by the opportunity to improve efficiency while cutting IT costs, SMBs are adopting cloud computing, yet they continue to express concerns about privacy in the cloud, …

One in ten SMEs have suffered a data hack

One in ten small businesses in the UK have experienced a data hack. Hiscox research also revealed that 90% don’t have a cyber crime insurance policy in place to protect …

BYOD governance, security and privacy issues

Even IT professionals tasked with securing corporate data would be concerned about the privacy of their personal information if mobile device management (MDM) software were …

Spear phishing targets one in two organizations

Proofpoint announced findings from a survey of security IT enterprise decision makers, about email and information security trends. Key findings include: Spear phishing is an …

Most companies block cloud services

While 80 percent of companies do not allow their employees to use cloud based file synchronization services, 70 percent of companies would use these services if they were as …

The growing headache of protecting mobile devices

33 per cent of UK organizations foresee the protection of mobile devices in the workplace to be the biggest security headache they will encounter in the year ahead, according …

Big brands utilized in malware distribution

Commtouch security analysts have seen substantial continued blending of big brand names with malware. Researchers named the following top seven brands that were abused in …

Majority of small businesses not confident in network security

More than half of IT administrators at small businesses would not bet their own money that all of the computers their business owns and employees use are free of malware (51%) …

Major pitfalls involving vulnerability scanners

While 92 percent of companies have a vulnerability management program in place, nearly half consider their networks to range from “somewhat” to …

Don't miss

Cybersecurity news