Free and cheap ways to learn about IT security

Credit to Author: Eric Geier| Date: Fri, 02 Jun 2017 03:00:00 -0700

Whether you’re an IT student or have been in the field for many years, the learning never stops, especially in regards to security. Hackers are discovering vulnerabilities in our software and systems 24/7. They’ll always find new ways to steal data, infect computers and wreak havoc in the digital world.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

(Insider Story)

Read more

(Insider Story)

Read more

What it takes to become an IT security engineer

Credit to Author: Stacy Collett| Date: Wed, 29 Mar 2017 03:56:00 -0700

When Scott Copeland got his associate degree in network administration back in 2004, the community college he attended didn’t offer IT security courses, “but it gave me the foundation to learn more about network security,” he says. His determination and thirst for learning led him to his current job as an IT security engineer at FedEx Services in Memphis, Tenn.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

How to deal with backdoors inserted or left by vendors

Credit to Author: David Geer| Date: Tue, 28 Mar 2017 03:54:00 -0700

It’s bad enough when black hat hackers insert malicious backdoors into systems and software after vendors/makers have sold these into the marketplace. It is another matter when the vendors who create these devices and programs unwittingly or purposely leave backdoors inside their products.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

The ultimate guide to strategic tech partners

Credit to Author: Bob Violino| Date: Mon, 20 Mar 2017 03:38:00 -0700

The IT vendor landscape is constantly in flux, with mergers, acquisitions, new technology developments and the growth of the cloud having a huge impact on which companies might be the most strategic partners for organizations looking to enhance their technology infrastructure.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

Zix wins 5-vendor email encryption shootout

Credit to Author: David Strom| Date: Mon, 13 Mar 2017 04:23:00 -0700

Email encryption products have made major strides since we last looked at them nearly two years ago. They have gotten easier to use and deploy, thanks to a combination of user interface and encryption key management improvements, and are at the point where encryption can almost be called effortless on the part of the end user.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

Why email is safer in Office 365 than on your Exchange server

Credit to Author: Mary Branscombe| Date: Thu, 09 Mar 2017 04:11:00 -0800

Running your own email servers doesn’t do anything to differentiate your business from the competition (except in a bad way, if you get hacked). But avoiding the effort of managing and monitoring your own mail server isn’t the only advantage of a cloud service. The scale of a cloud mail provider like Office 365 means that malware and phishing attacks are easier to spot — and the protections extend beyond your inbox.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more