How to market security: 8 tips for recruiting users to your cause How to avoid using RDP on Windows CSO Update August 22, 2019 How to market security: 8 tips for recruiting users to your cause Getting users to care about security is a much-lamented challenge. What you need is a marketing plan. Read more ▶ Your Must-Read Stories • How to avoid using RDP on Windows • Beware rogue email rules and forms • What is access control? A key component of data security • 6 risk factors to know when hiring an MSSP • Safe travels: 7 best practices for protecting data at border crossings • Best antivirus software: 10 top tools White Paper: Carbon Black Cognitions of a Cybercriminal Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behavior.Attackers are getting better at moving around inside systems without being detected. Read more ▶ How to avoid using RDP on Windows Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it's time to stop using it where possible. Here's how. Read more ▶ DEALPOST There's finally a communication app tailormade for on-the-go teams. Try it free. This intuitive collaboration platform is made for teams that move. Read more ▶ Beware rogue email rules and forms Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here's how to make sure you can detect it. Read more ▶ What is access control? A key component of data security Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges. Read more ▶ 6 risk factors to know when hiring an MSSP A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes. Read more ▶ Safe travels: 7 best practices for protecting data at border crossings Border agents are requesting access to devices and the data on them with no regard to your organization's security policies. Here's how to protect that data and your employees. Read more ▶ Best antivirus software: 10 top tools These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability. Read more ▶ Video/Webcast: EMA Analyst Research Achieve IT Operations Success with a Unified Approach to Network Monitoring Attend this webinar to learn how enterprises can improve network operations by adopting a unified network monitoring platform. Read more ▶ Email not displaying correctly? View it in your browser You are currently subscribed to CSO Update as tuwanan.mono@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy Learn more about Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701 Please do not reply to this message. To contact someone directly, send an email to newsletters@idg.com.