//
archives

Cybersecurity

This tag is associated with 19 posts

Phishing and the Human Factor.

Phishing remains, despite widespread knowledge and precaution, one of the most prolific and successful of all crooked methods used to gain access to your accounts and/or sensitive data. While many know the risks, far fewer seem to comprehend just how at-risk their organization is from the co-opting of users via phishing scams. Why exactly is … Continue reading

Modernizing Security: Multi-Factor Authentication.

Picture this: You run an exclusive nightclub with an entrance guarded by a tremendous bouncer. He holds a list of all those allowed entry on thoe wild Friday dance-off nights. You just walk up, tell him your name – and if you’re on the list, you get in. Cue “Night at the Roxbury” head tilt. … Continue reading

BotNet Report: Threats and Analysis.

The U.S. Department of Commerce recently released an interesting report on the increasingly sophisticated threat of botnets – groups of computers and/or computerized devices that can be used for malicious purposes, such as large-scale DDoS attacks or spamming messages.  The report makes 6 specific notes worth chewing on: 1.  Automated, distributed attacks are a global … Continue reading

Follow IT PRO Source on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 48 other followers

Archives

About the Editor

Austin Thomé

Austin Thomé

Writer, enthusiastic IT Professional, expert coffee drinker, and website proprietor.

Personal Links

View Full Profile →