How to avoid common travel and vacation scams
From social engineering before you even get on the plane to apps that are riddled with security holes, it’s never been easier for cybercriminals to target unsuspecting travelers.
View ArticlePeople are (still) the biggest security risks
Social engineering and ‘download this attachment’ scams are back – as if they ever left – and working better than ever, unfortunately.
View ArticleHas telecommuting finally become mainstream?
As the desire for workplace flexibility continues to be an accepted fact of contemporary working life, more and more businesses are wrestling with how exactly to embrace – or curtail – telecommuting as...
View ArticleAre IT executives blind to cybersecurity threats?
If IT leaders and IT workers can’t agree that there’s a problem, what are the chances that they’ll actually implement the cybersecurity policy they need?
View ArticleFour tech nightmares keeping IT leaders up at night
What’s keeping CIOs awake at night? From data breaches to social engineering, there’s plenty to keep tech types tossing and turning.
View ArticleCan UC keep remote workers engaged?
For something that seems so simple in theory, unified communications can be hard to pull off in practice. But it might be the only thing helping to keep your distributed workforce engaged.
View ArticleWhat are hackers up to these days?
The short answer: They’re targeting sites in North America, where they’re planting malware in ad networks and launching dating site spam.
View ArticleRio’s airport preps for Olympics with new Wi-Fi network and mobile app
With the 2016 Olympic Games promising to bring millions of visitors to Rio de Janeiro’s Galeão International Airport, its CIO initiated a huge wireless network upgrade and a new mobile app.
View ArticleThe dangerous cost of ‘free’ Wi-Fi
If it seems too good to be true, it probably is. Free Wi-Fi is no exception to this adage. Security company Avast tested this theory by setting up a number of free fake Wi-Fi hotspots to see how many...
View ArticleGovernment ill-equipped to thwart cyberwarfare
The U.S. infrastructure is outdated and vulnerable to cyberattacks. If government reaction doesn’t improve the country electrical could be crippled.
View ArticleHow to conquer a CRM monster
A network of travel agencies found the CRM system it had been using for eight years had become a monster, so it turned to a cloud-based option -- and the results were off the charts.
View ArticleWhy gifts cards are the new favorite target for fraud
With tighter post-financial crisis regulation on larger amounts of money, and safer chip-enabled debit and credit cards, fraud has shifted to a new target, gift cards.
View ArticleWhy some people are willing to pay for a mobile app
A look at who will and who won’t pay for an app and what it means for mobile app developers.
View Article5 keys to supply chain management success
As technology has spun forward, so has how supply chains work and the best practices to manage them. Here are five keys to supply chain management success.
View ArticleWhat is a project management office (PMO) and do you need one?
Companies seeking more efficiency and tighter monitoring of IT projects are opening project management offices (PMO) in growing numbers. here’s what a PMO should do, what types you should consider, and...
View Article