Access your Pro+ Content below.
End-user security awareness training is a must-have
This article is part of the Access issue of July 2018, Vol. 2, No. 4
These days, you can do a lot of things with a click of a button: send an emoji, record your favorite TV show, order paper towels from an online retailer that ships to you within two business days. But it can also take just one click -- say, opening a compromised email or URL -- to breach a company's entire network. IT departments can combat end-user security risks by implementing malware protection, threat detection, network security tools and more. But perhaps it's more important to address the human element -- educate employees on threats and how to avoid them through end-user security awareness training. "The key is to continually keep security on the top of users' minds," said Kevin Beaver, an independent security consultant at Principle Logic. "It's all about working together with management, especially HR, to ensure that common-sense security basics … become part of the organizational culture. To simply assume that users will always make good choices is to assume that your security program has no flaws." Why you need ...
Access this PRO+ Content for Free!
Features in this issue
Despite Dell's best efforts, including combining CPU and GPU in a single processor to make the device smaller, the XPS 15 2-in-1 still falls short as a tablet.
Apple's DEP was the groundbreaking template for the future of endpoint provisioning. The program helps businesses and educators simplify enrollment and management.
News in this issue
There are lots of different ways to keep users up to date on the latest security risks and how they should be handling their corporate resources.
Columns in this issue
Work-related email and other communications have spilled over into after-work hours for many employees today. But should the IT department get involved in monitoring that?
The end-of-extended-support date for Windows 7 is a short 18 months from now: Jan. 14, 2020. Make sure you're ready and have considered Windows 10 as well as other options.
Unified endpoint management strategies are evolving to include not just mobile devices, but sensor-connected IoT devices, too. Intelligent edge management can help.