article thumbnail

Five tips for protecting your brand on social media

Network World

The bad guys responded to those inquiries and pointed users to the fake site where they would ask for, and sometimes receive, personal and account information – an attack called angler phishing.

Media 210
article thumbnail

What’s the Top Information Security Priority for Every SMB

Social, Agile and Transformation

Some context: I rarely blog about information security because it’s outside my core expertise in digital transformation. It’s hard to drive transformation and also have a risk and security mindset, and it’s extraordinarily time-consuming to keep up with the latest security threats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Photograph Leak Demonstrates Importance of Good Hygiene

CTOvision

The Washington Post , The New York Times , and The Wall Street Journal have dedicated front-page links to the story, in a press wave that will contribute to the public’s increasing exposure to cybersecurity concepts and the growing importance of information security.

article thumbnail

The Small Business Guide to Information Security

Galido

Information Technology Blog - - The Small Business Guide to Information Security - Information Technology Blog. Information security is a major issue in the business world, and security breaches cost businesses millions of dollars per year. But they can be particularly disastrous to small businesses.

article thumbnail

AT&T Becomes the Latest Company Affected by Data Breach

CTOvision

The urgency of improving information security cannot be understated. Since the widely publicized attack on Target Corporation, data breaches have become increasingly common – sensitive information stored with both eBay and the California Department of Motor Vehicles has been compromised in the last six months alone.

Company 268
article thumbnail

Acknowledging Our Love-Hate Relationship With Security Certifications

Forrester IT

It’s nothing new that social media is a hotbed of hot takes. But that doesn’t mean that it should all be dismissed as nonsense, especially when it comes to information security. Even the most innocuous posts somehow manage to offend or anger someone out there on the internet.

Security 195
article thumbnail

4 methods to help CIOs manage cyber stress

CIO Business Intelligence

Seeing that hackers don’t work 9 to 5, IT and information security professionals generally don’t get enough rest, says Itumeleng Makgati, group information security executive at Standard Bank. The experts share their four top tips below. . Encourage your teams to slow things down.