June 15, 2018
U.S. federal agencies worked with international law enforcement in Operation Wire Wire to find and prosecute alleged cybercriminals conducting business-email-compromise scams.
May 31, 2018
One of four Yahoo hackers was sentenced to five years in prison for his role in the massive 2014 breach, which included accessing millions of sensitive email accounts.
May 16, 2018
, This morning I received an e-mail with extracts from a Gartner press release saying: “Infrastructure and Operations skills (I&O) gaps will cause 75% of organizations to experience visible ...
March 28, 2018
Recent updates to Chrome continue to increase its viability for business users, which could make it difficult for Microsoft's Edge web browser to take over shares of Google's in the enterprise.
Email Get Started
Bring yourself up to speed with our introductory content
An email virus consists of malicious code that is distributed in email messages, and it can be activated when a user clicks on a link in an email message, opens an email attachment or interacts in some other way with the infected email message. Continue Reading
Outlook on the web is the browser-based email client for users to access email, calendars, tasks and contacts from Microsoft's on-premises Exchange Server and cloud-based Exchange Online. Continue Reading
Americans are stressed, and job anxieties are a major cause. Here's what some employers are doing to make sure their employees are happy -- and not looking for their next gig. Continue Reading
Evaluate Email Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft Teams is an app users can work with to collaborate no matter where they're located. It comes as part of certain business-focused Office 365 subscriptions. Continue Reading
Plenty of companies still use the Apache Ant tool in Java development cycles and as part of their continuous deployments. Here's why Apache Ant is still a great choice for CI/CD. Continue Reading
As Microsoft retires some of its mobile messaging-related services and improves others, the future of its mobile presence could be in one app -- the Outlook mobile app. Continue Reading
Learn to apply best practices and optimize your operations.
The internet of things, by its very design, extends enterprise technology infrastructure further and further out, computerizing devices whose functions, if corrupted, could have catastrophic results. The sheer scope of internet-connected devices is compounding IoT security risks: CISOs now must worry not only about compromised or stolen data but the potential for bad actors to hijack vehicles, heavy machinery and medical equipment.
"People talk about IoT being the new hot thing, but it has been there almost 20 years in medical care," said Taylor Lehmann, CISO for both Wellforce and its academic hospital, Tufts Medical Center based in Boston. "What has changed is the number of these devices and how many of these devices are vulnerable."
Strategies to manage IoT security risks outside of healthcare and a few other industries remain in the early stages. Many connected devices can't be patched or updated, nor do they have security features such as basic encryption and two-factor authentication. The skills to secure IoT, which require knowledge of software and hardware, are challenging to find.
Even so, experts say cybersecurity in the internet of things era draws on the same technologies and practices that have proven effective over the years, thereby giving CISOs and their organizations a roadmap for extending security as the number of devices multiplies. In this issue of Information Security magazine, we talk to CISOs and other information security experts about IoT security risks and strategies for managing them.Continue Reading
Companies have moved beyond messaging and email to Slack, Teams and even AI-powered scheduling and voice recognition. Are you ready for collaboration hubs and virtual assistants? Continue Reading
Keeping users productive is one of the most critical jobs IT pros have. But there are some hurdles to jump, including understanding the risks with collaboration tools. Continue Reading
Problem Solve Email Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Automation might end human employment as we know it. The final result is in question, but we can draw clues from the relationship between automation and employment. Continue Reading
Outlook crashes and rendering issues might require an upgrade -- or a downgrade -- for administrators who want to avoid a Band-Aid approach and want a permanent solution. Continue Reading
Threat actors are using phishing email campaigns to fool users with tech support scams and fake Blue Screens of Death. Learn how these campaigns work with expert Nick Lewis. Continue Reading