7 commonly overlooked ways to tighten cybersecurity

When you setup your network’s security plan, quite often you have the big picture covered but some times there are those minute details that get shelved or forgotten. Here are a few items IT security officers should make sure they have covered.

The weakest link in the security chain is always the end user. There is always someone who believes they know better or a policy doesn’t apply to them. To the extent that compliance with security policies can be automatically enforced even for the professionals, they should.
To read this article in full or to leave a comment, please click here
Read more: 7 commonly overlooked ways to tighten cybersecurity
Story added 18. November 2014, content source with full text you can find at link above.
More antivirus and malware news?
- The cellphone unlocking bill is about to become law — but there’s a catch
- Facebook hoax? Can you sniff out gas station card skimmers using Bluetooth?
- Is Apple’s reluctance to implement a bug bounty program a security risk?
- SSCC 144 – iOS malware, fingerprint security, WhatsApp privacy, hacking the taxman [PODCAST]
- MikroTik Routers Exploited in Massive Crypto-Mining Campaign
- Update: UCS Outage
- The Upload: Your tech news briefing for Friday, February 6
- Flipboard data breach – what users should do now
- Security cameras vulnerable to attacks using infrared light
- ‘Reveton’ ransomware upgraded with powerful password stealer