Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×
Security

Submission + - Top 10 Internal Security Threats (says CIO.com) (cio.com)

Esther Schindler writes: "An endpoint is any device that can connect to the corporate network (desktop computer, notebook, cell phone, whatever). The Bad Guys who want to break in are focusing more attention on those endpoints because, after all, users are known to be lax about security even if the IT department is professionally paranoid. In Securing the Endpoints: The 10 Most Common Internal Security Threats CIO.com enumerates the top 10 internal-to-the-company vulnerabilities, and what companies can do about them."

"If it's not loud, it doesn't work!" -- Blank Reg, from "Max Headroom"

Working...