Search This Blog

Monday, January 09, 2012

Social engineering attacks on the enterprise are trending upward

Be on the lookout for the malicious insider | 5 LinkedIn Tips for Career Success in 2012

Network World IT Best Practices

Forward this to a Friend >>>


Social engineering attacks on the enterprise are trending upward
Amit Klein, CTO of the security firm Trusteer, predicts that social engineering attacks against enterprises will be on the rise in 2012. The problem is that too many people disclose too much personal information on social networks, and this gives thieves the leverage they need to gain and then abuse people's trust. Read More


WHITE PAPER: HP & Intel

Growing Your Business Without a Crystal Ball
Learn how an upgrade at Opus Interactive allows scalable storage growth with 40 percent less upfront cost. Read Now!

WHITE PAPER: Splice Communications

Offloading Telecom Delivers a Big Payback for IT
Inaccurate invoices, complicated contracts, slow provisioning and poor support from Telecom carriers wastes time, money and resources. Learn the difference a custom data network solutions provider can deliver. Read Now!

Be on the lookout for the malicious insider
A new white paper from Symantec profiles the risk indicators of the malicious insider. There are key patterns and technologies that can help you identify the employee who might have a penchant to steal your company's intellectual property. Read More

5 LinkedIn Tips for Career Success in 2012
When 80 percent of people reportedly don't know how to use LinkedIn properly, a New Year's resolution is born. Read More


WHITE PAPER: Sybase

Enterprises Falling Short with Analytics Tools
This paper examines the use of analytics and reporting, and offers best practices for integrating solutions for improved business decision-making. Learn More

Tips from IT professionals on how to handle virtual desktops, wireless, network performance issues
Schools are for learning, and the information technology and security professionals who support networks and applications in the nation's K-12 and university systems are discovering new tactics in what can be challenging IT environments. Here we talk to four professionals in the education realm to get a sense for their top IT issues and what they do to handle them. Read More

Consumerization creates IT management blind spots, increases business risk: survey
As end users bring their own devices to work, download apps and sign up for cloud services, it's getting harder for IT to maintain application visibility and control performance. Trends such as consumerization, mobility and cloud computing are also increasing business risk, CIOs say. Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

IT pros lament: Low pay, no perks
Non-competitive pay is the main reason for high turnover rates among IT pros in their 20s and early 30s. Read More

Bandwidth bottlenecks loom large in the cloud
InterContinental Hotels Group (IHG) CIO Tom Conophy has no reservations when it comes to the cloud. Read More

Mobility, cloud, analytics to reshape IT in 2012
Gartner says global IT spending growth will be essentially flat in 2012. IDC is more bullish, estimating 6.9% growth, driven by investments in smartphones, media tablets, mobile networks, social networking, and big data analytics. Read More



SLIDESHOWS

10 essential data center appliances
With all of the noise in data center networking focused on switches, fabrics and lossless Ethernet standards, appliances like WAN optimizers and application accelerators are often overlooked. But they are important components of the data center/cloud infrastructure, especially as organizations virtualize desktop applications for remote sites. Here's a listing of 10 of the top players, and their products, in data center appliances.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. IPad 3 rumor rollup for the week ending Jan. 3
  2. Who's lying? The iPad owner or the border guard?
  3. Microsoft patch blows 'perfect game' but sends important message
  4. 9 hot technology startups to watch in 2012
  5. Cisco dumps the UMI personal telepresence very quietly
  6. iPhone 5 rumor rollup for the week ending Dec. 31
  7. Software whiz Ray Ozzie re-emerges with startup Cocomo
  8. 2 days for amateur hacker to hack smart meter, fake readings
  9. IT pros lament: Low pay, no perks
  10. Facebook Timeline scams prey on wishful thinking

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: