Don't-Miss Security Stories

cian 002

How to minimize the risks of phishing scams

Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing scam and how you and your workers can avoid becoming a victim.

Virtru

Setting up DLP features for email security

Network World contributing editor David Strom provides a roundup of how to enable data leak prevention features on three email security platforms.

How to remove malware

If you've found malware on your system, what should you do about it? This video walks you through the steps of getting the bad stuff off your PC.

ransomware locky

How to recover your system from a Ransomware attack

After infecting a system with Locky Ransomware, CSO attempted to recover it using basic tools and backups

CSO Online's Steve Ragan infects a laptop with Locky Ransomware

What a Locky Ransomware attack looks like

CSO Online's Steve Ragan infects a laptop with Locky Ransomware

Why You Lost Your Windows 10 Product Key

Goodbye, product key; hello, digital license. Learn more about the changes here.

Install Windows 10 with privacy settings

The Express settings option will make your installation go faster, but you might inadvertently agree to conditions you wouldn't choose for yourself.

How to remove your Windows 10 password

Windows 10 wants you to enter your password all the time. You can remove your password, or reduce how often you have to enter one, but there are security risks to doing so.

How to set up two-factor authentication for iCloud

Apple is reportedly going to require two-factor verification for some new iCloud services. Here's how to set it up.

Create a lock-screen image that will save your iPhone or iPad (or your life)

This video tip shows you how to quickly and easily make a custom lock-screen image for your iOS devices that contains contact and emergency information.