Web hosting companies are adding tracking codes into the web pages that they host without the user knowing
There is absolutely no major IT security product created that has no flaws or vulnerabilities.
Every company should ask vendors for a copy of their latest security assessment. Don't let them access to your network without having them tested.
I thought this week I would recommend a great new book by Brian Krebs called SPAM Nation. If you ever wanted to know why we deal with SPAM and malware this is the book to read. He goes into the reasons why, who is buying these offers, and what the business model is.
If you search for a security solution that is automatic you will find tow things, malware on your network and disappointment.
Never assume a third party network is secure. Do not allow access blindly into your network.
Conventional wisdom is always wrong. Avoid it at all costs when securing your network.
Governments want to control internet access. Under the guise of Net Neutrality, a clever plain words.
Bill Gates feels that Microsoft Office is the most important program and that it will cause people to leave Apple and Android fro Windos phones.
There is often alack of commitment when it comes to projects inside of some organizations.