//
archives

Security

This tag is associated with 8 posts

The 4 Thoughts of Highly Secure Users.

When it comes to IT security in the workplace, not all users are on the same page. Some are prepared to defend the integrity of their password to the death; others are ready to license it for appearance on a Goodyear blimp. Which mindset do you think is more conducive to a secure IT environment? … Continue reading

Modernizing Security: Multi-Factor Authentication.

Picture this: You run an exclusive nightclub with an entrance guarded by a tremendous bouncer. He holds a list of all those allowed entry on thoe wild Friday dance-off nights. You just walk up, tell him your name – and if you’re on the list, you get in. Cue “Night at the Roxbury” head tilt. … Continue reading

BotNet Report: Threats and Analysis.

The U.S. Department of Commerce recently released an interesting report on the increasingly sophisticated threat of botnets – groups of computers and/or computerized devices that can be used for malicious purposes, such as large-scale DDoS attacks or spamming messages.  The report makes 6 specific notes worth chewing on: 1.  Automated, distributed attacks are a global … Continue reading

Follow IT PRO Source on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 35 other followers

Archives

About the Editor

Austin Thomé

Austin Thomé

Writer, enthusiastic IT Professional, expert coffee drinker, and website proprietor.

Personal Links

View Full Profile →