Skip navigation

Stay off the Security Snafus List

Seal up security cracks with resources from Windows IT Pro

In his January 2009 web-exclusive article, “Top Ten Infosec ‘Oops!’ of 2008”, Tony Howlett lists the biggest screw-ups of last year. While I mocked accordingly the Spores amoeba’s evolution dissolution and the Zune’s Christmas-time crash, I couldn’t find fun in the folly of 11,348,196 compromised private records—in 687 separate incidents.

Tony asks, “Is it wishful thinking to hope it will be better in 2009?” I say that wishes can come true. To keep you off of his naughty list for 2009, I’ve made a list of my own. Check out these must-see security resources, and seal up the cracks in your organization before it’s too late!

  • “A 5-Step Security Plan”
    With the matter-of-fact tagline “‘It can’t happen here’ is no excuse,” this web-exclusive article summarizes a security seminar’s advice into an easy-to-follow plan for your organization.
  • “Ease Security Headaches”
    Russell Smith reviews common security aggravations and offers suggestions for how to handle them.
  • “Lumension Survey Notes Top Threats”
    Find out the top security concerns from a recently posted trends survey and read more about the survey results with picks from Security Editor Lavon Peters.
  • “Top Ten Net-Surfing Risks at Work”
    Tony Howlett warns of the 10 most dangerous Internet activities for the workplace and gives me at least 4 things to feel guilty about.
  • Vista Security, Parts 1 and 2
    Windows Vista has been touted as Microsoft’s most secure OS ever. Karen Forster interviews Microsoft product managers about Vista’s built-in security features.
  • Security UPDATE
    Learn how to avoid or fix Windows security risks and attacks with the expert commentary and tips in this free weekly email newsletter. Find out more at windowsitpro.com/email.

To view more security articles, see the Security topic page at Windowsitpro.com/Security.

Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish