Don't-Miss Security Stories
Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing scam and how you and your workers can avoid becoming a victim.
Network World contributing editor David Strom provides a roundup of how to enable data leak prevention features on three email security platforms.
If you've found malware on your system, what should you do about it? This video walks you through the steps of getting the bad stuff off your PC.
After infecting a system with Locky Ransomware, CSO attempted to recover it using basic tools and backups
CSO Online's Steve Ragan infects a laptop with Locky Ransomware
Goodbye, product key; hello, digital license. Learn more about the changes here.
The Express settings option will make your installation go faster, but you might inadvertently agree to conditions you wouldn't choose for yourself.
Windows 10 wants you to enter your password all the time. You can remove your password, or reduce how often you have to enter one, but there are security risks to doing so.
Apple is reportedly going to require two-factor verification for some new iCloud services. Here's how to set it up.
This video tip shows you how to quickly and easily make a custom lock-screen image for your iOS devices that contains contact and emergency information.