Author: a8cd5fb7_admin
Emotional, Physical Cost of Workplace Bullying
SYSTEMATIC DESTRUCTION: It jeopardizes health, career and the job once loved by the victim BRODIE Panlock was a waitress working at a café in Australia. Her mother described her as a “beautiful girl who was full of compassion”. Brodie never told her mother that she was viciously bullied by her co-workers. She was just 19 […]
5 Mobile Security Lessons From the Department of Defense
Several years ago, the National Security Agency wasted millions on a circuit-switched approach to mobile security strategy. With help from the Department of Defense, the NSA is doing things differently now. Enterprise CIOs can learn a few things from the effort, too. Try this thought experiment. You want to provide smartphones, iPads and other mobile […]
Claim of Iphone Hacking Raises Questions About FBI Data
A hacker group says it obtained millions of identification numbers from iPhones, iPads and other devices from an FBI laptop. The agency denies having the data. WASHINGTON — A hacker group’s claim that it obtained from an FBI laptop a file with more than 12 million identification numbers for Apple iPhones, iPads and other devices […]
Shifty, But Secure Eyes
A biometric security system based on how a user moves their eyes is being developed by technologists in Finland. A biometric security system based on how a user moves their eyes is being developed by technologists in Finland. Writing in the International Journal of Biometrics, the team explains how a person’s saccades, their tiny, but […]
10 Tips for Protecting Mobile Users
Mobile employees, devices, and data need protecting. Here are 10 tips to make it happen. These days, every user is mobile. Laptops, smartphones, tablets, and constant connectivity have unshackled all of us from our desks. And thanks to the ready availability of apps and cloud services that blur the line between consumer and business tools, […]
Higher Retail Wages Correlate with Lower Levels of Employee Theft
A study co-written by a University of Illinois business professor shows that higher wages are associated with lower levels of employee theft, shedding light on the impact that compensation practices have on shaping employee honesty and ethical norms in organizations. Using data sets from the convenience-store industry, Clara Xiaoling Chen, a professor of accountancy, and […]
10 Ways Enterprises Can Battle Malware
As malicious code rapidly evolves, the National Institute of Standards and Technology is updating its guidance to reflect changes in the threat malware presents organizations. The “Unlike most malware threats several years ago, which tended to be fast-spreading and easy to notice, many of today’s malware threats are more stealthy, specifically designed to quietly, slowly spread to […]
Tech Insight: Speeding Up Incident Response With Continuous Monitoring
Increase speed and effectiveness of incident response through continuous monitoring and enterprise IR tool integration Continuous monitoring is a buzz phrase come back to life thanks to the U.S. Office of Management and Budget and the Homeland Security Department telling government agencies to implement information security continuous monitoring (ISCM). NIST has also released three new […]
Homeland Security Cites Sharp Rise in Cyber Attacks
The companies that control critical infrastructure in the United States are reporting higher numbers of attacks on their systems over the past three years, according to a report issued by the Department of Homeland Security. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) says the number of reported attacks is up and attackers have […]
Spy Agency Fights to Protect ID’s of Sources
Canada’s spy agency says its network of informants has been “imperiled” by a Federal Court of Appeal decision that struck down its right to always shield the names of its sources. Canada’s spy agency says its network of informants has been “imperilled” by a Federal Court of Appeal decision that struck down its right to […]