The importance of data retention policies

A data retention policy is the first step in helping protect an organization’s data and avoid financial, civil, and criminal penalties that increasingly accompany poor data management practices. This... Read more »

Auditing and logging policy

Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that... Read more »

Access management policy

Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the... Read more »

Study: Companies have upwards of 1,000 apps but only a third are integrated

A new study by Salesforce’s MuleSoft suggests more isn’t necessarily better if an organization’s applications are not playing well together. Unfortunately, more than 70% remain disconnected from one another... Read more »

Prilex POS malware evolves to block contactless transactions

A new version of the Prilex POS malware has found a novel way to steal your credit card information. The post Prilex POS malware evolves to block contactless transactions... Read more »

Lifetime VPNSecure subscriptions are now just $39.99

Secure your internet connection now with VPNSecure while it’s still on sale. The post Lifetime VPNSecure subscriptions are now just $39.99 appeared first on TechRepublic. Read more »

The headache of changing passwords

Change Your Password Day — an annual reminder of just how bad passwords really are. The post The headache of changing passwords appeared first on TechRepublic. Read more »

New cybersecurity BEC attack mimics vendors

A new business email attack threat actor is using a stealth tactic to avoid giveaways of typical social engineering attacks. Learn the best defense for protecting your company. The... Read more »

OneNote documents spread malware in several countries

A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K., Canada and the U.S. The post OneNote documents spread... Read more »

IT staff systems and data access policy

IT pros typically have access to company servers, network devices and data so they can perform their jobs. However, that access entails risk, including exposure of confidential information and... Read more »
Subscribe to our Newsletter