Executive Resources

Hanging on the Telephone: Antivirus Cold-calling Support Scams

Source: Eset
Service support scammers rely on the naiveté of their victims in order to persuade them to grant access to their computers and credit card details. There’s very little a security company can do directly to prevent this activity, apart from keeping its own software up to date so as to detect malware and block as many threats as possible. Read this white paper to find out about different types of scams that threaten your data security.



Related content:

Staying Ahead of the Curve: How to Ensure Your IT Organization Is in Touch with the Latest Industry Developments

New technology comes out daily; the key for every company is to determine when exactly to start using it. Are you on the bleeding edge, the leading edge, or are you a cautious adopter? Depending on the needs of the company and the technology, any one of those choices may be the right one. How do you decide which way to go? Listen to your IT team. Find out what three leaders in IT have to say and where they stand on the technology adoption spectrum and why.

New DoD Regulations for the Cybersecurity Age: Implementing and Paying for the DFARS UCTI Safeguarding Contract Clause

The Department of Defense (DoD)’s acquisition clause on safeguarding unclassified controlled technical information (UCTI) affects DoD contractors of all sizes. Failure to comply with the requirements or to report a cyber incident now constitutes a breach and could result in fines or contract termination. Aronson’s white paper addresses many of the issues surrounding the new clause, including its implications for your business and how to comply.

Three Fundamental Rules for Choosing the Best Remote Control Software

For almost 30 years, remote control software has made it possible for IT professionals to connect to laptops, desktops, servers and other devices to manage networks and provide support. saving time, money, and resources. Yet in an evolving IT environment, the business requirements for remote control software are also changing. Today, a remote control solution must meet the needs of a heterogeneous workforce, deploy solutions across many users, and provide extensive security. This paper looks at three crucial rules to follow in choosing remote control software.

Embedded Devices & Data Thieves

In an era known as “the Internet of Everything,” embedded devices are on the rise—still embedded security remains a weak link. For many companies, basic security deficiencies are the norm, a fact borne out by the number of hacks in the headlines. This paper explores the methods that data thieves rely on to crack embedded devices, then presents a model for a multi-layer security strategy, honing in on embedded remote access for an in-depth example.

Vulnerabilities—The World Through the Eyes of Hackers

Vulnerabilities are becoming even more fundamental in the world of cyber-security. Hackers or attackers see vulnerabilities all around them, knowing they are key to achieving their goals. This white paper will help you to understand the key fundamentals of the attacker view and build and maintain powerful security profiles so you can turn the tides of battle.