IT Security Threats

Combatting Business Identity Fraud

If you’re like me, by now you’ve most likely received quite a few phishing emails from supposedly prospective customers that are almost comical in their ineptness. Unfortunately though, if criminals didn’t have at least some success using these tactics we wouldn’t still be seeing them – and watching them evolve into more complex and sophisticated forms.

The IT Threat On (or Under) Your Desk

Can you identify the significant common factor in these attention-grabbing headlines? Thousands of secret diplomatic communications are stolen from the US government and posted onto WikiLeaks. A powerful computer worm (dubbed “Stuxnet”) invades isolated computer networks to wreak havoc with physical machinery that drives a foreign government’s nuclear programs. The…