7 commonly overlooked ways to tighten cybersecurity
When you setup your network’s security plan, quite often you have the big picture covered but some times there are those minute details that get shelved or forgotten. Here are a few items IT security officers should make sure they have covered.
The weakest link in the security chain is always the end user. There is always someone who believes they know better or a policy doesn’t apply to them. To the extent that compliance with security policies can be automatically enforced even for the professionals, they should.
To read this article in full or to leave a comment, please click here
Read more: 7 commonly overlooked ways to tighten cybersecurity
Story added 18. November 2014, content source with full text you can find at link above.
More antivirus and malware news?
- Why You Should Monitor Your Website
- IcedID Trojan Operators Experimenting With New Delivery Methods
- WordPress Update – 4.9.7 Security & Maintenance Release
- Oracle Java SE/Java SE Embedded CVE-2019-2975 Remote Security Vulnerability
- The New iMessage Is Great. But Why on Earth Isn’t It on Android?
- Great R packages for data import, wrangling and visualization
- Credentials Stealer on Prestashop
- At Odds: The Promise vs. Operational Reality of Security Solutions
- Google Announces Enhanced Fraud Protection for Android
- Senate subcommittee blasts FCC and Team Telecom approach to Chinese supply chain threats