7 commonly overlooked ways to tighten cybersecurity

When you setup your network’s security plan, quite often you have the big picture covered but some times there are those minute details that get shelved or forgotten. Here are a few items IT security officers should make sure they have covered.

The weakest link in the security chain is always the end user. There is always someone who believes they know better or a policy doesn’t apply to them. To the extent that compliance with security policies can be automatically enforced even for the professionals, they should.
To read this article in full or to leave a comment, please click here
Read more: 7 commonly overlooked ways to tighten cybersecurity
Story added 18. November 2014, content source with full text you can find at link above.
More antivirus and malware news?
- Google to pay rewards for open-source code security fixes
- Microsoft Windows Kernel CVE-2018-8443 Local Information Disclosure Vulnerability
- NASA Didn’t Even Come Close to Creating a Secure Cloud Network
- Cisco Announces It is Laying Off Thousands of Workers
- How Chat App Discord Is Abused by Cybercriminals to Attack ROBLOX Players
- Microsoft Windows Kernel ‘Win32k.sys’ CVE-2017-0246 Local Privilege Escalation Vulnerability
- The Madi Campaign – Part I
- Vigilante engineer stops Waymo from patenting key lidar technology
- Resolved: TSM Self-Service Portal upgrade
- Windows 7, XP vulnerabilites rose in 2013, security firm finds