Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - Top 10 Internal Security Threats (says CIO.com)->

Submitted by
Esther Schindler
Esther Schindler writes "An endpoint is any device that can connect to the corporate network (desktop computer, notebook, cell phone, whatever). The Bad Guys who want to break in are focusing more attention on those endpoints because, after all, users are known to be lax about security even if the IT department is professionally paranoid. In Securing the Endpoints: The 10 Most Common Internal Security Threats CIO.com enumerates the top 10 internal-to-the-company vulnerabilities, and what companies can do about them."
Link to Original Source

Oh, so there you are!

Working...