Restrictive e-mail policies: Hidden security risks for business

Restrictive e-mail policies: Hidden security risks for business


Restrictive e-mail policies: Hidden security risks for business

Posted: 09 Mar 2011 07:03 AM PST

IT departments are fighting a losing battle in seeking to constrain employees' behavior through policy alone, according to Mimecast. Findings suggest that a new approach is needed in order to empow...

March Patch Tuesday details

Posted: 09 Mar 2011 06:53 AM PST

In the video below, Qualys CTO Wolfgang Kandek and Qualys vulnerability labs manager Amol Sarwate discusses this month's Microsoft Patch Tuesday release. ...

How can the author of an anonymous e-mail be identified?

Posted: 09 Mar 2011 05:36 AM PST

When anonymous letters were written by hand, graphologists were called in to identify the likely author. In this day and age when most such mail is sent electronically, it may be difficult to prove th...

Multiple vulnerabilities in Google Chrome

Posted: 09 Mar 2011 05:28 AM PST

Multiple vulnerabilities have been reported in Google Chorme, according to Secunia. Some have an unknown impact while others can be exploited by malicious people bypass certain security restriction...

Fraud losses drop on cards, cheques and online banking

Posted: 09 Mar 2011 05:18 AM PST

New figures show that banking industry initiatives are successfully keeping the fraudsters away from customers' cards and bank accounts. Fraud losses on UK cards, cheques and online banking all fell i...

Apple updates Java for Mac OS X 10.5 and 10.6

Posted: 09 Mar 2011 04:47 AM PST

The latest Java updates from Apple deliver improved reliability, security, and compatibility. Java for Mac OS X 10.5 Update 9 delivers improved compatibility, security, and reliability by updating ...

Will IPv6 render blacklisting obsolete?

Posted: 09 Mar 2011 04:10 AM PST

We are all aware that IP addresses have almost run out. Security experts are debating the pros and cons, but the sad fact is the migration towards IPv6 is inevitable. Now it remains only to adapt as f...

Risks to address when contracting for cloud services

Posted: 09 Mar 2011 01:15 AM PST

Gartner has identified four risky issues that CIOs and sourcing executives should be aware of when contracting for cloud services. "Cloud service providers will need to address these structural sho...

AV industry fails to cover the basics

Posted: 09 Mar 2011 12:10 AM PST

NSS Labs released two test reports of endpoint protection products which reveal new shortcomings in these widely deployed products. They cover multi-vector attacks (malware delivered from the web, ema...

New variant of SpyEye banking malware

Posted: 09 Mar 2011 12:05 AM PST

Norman researchers identified an emerging variant of the SpyEye Trojan that targets specific online banking applications. SpyEye is a malware toolkit that has become increasingly popular over the ...

The privacy impact of electronic health records

Posted: 08 Mar 2011 11:37 PM PST

While patients trust their doctors to protect their information, 49 percent believe that EHRs will have a negative impact on the privacy of their PHI and health data, according to CDW. As healthcar...

0 comments:

Post a Comment