Monday, April 15, 2013

Should you simulate a phishing attack on your own colleagues to raise security awareness?

  Why 'Agile Project Management Controls' Isn't an Oxymoron | How Benchmarking Can Improve IT Outsourcing Deals
 
  Network World IT Best Practices

Forward this to a Friend >>>


Should you simulate a phishing attack on your own colleagues to raise security awareness?
An innovative approach to security awareness training is to use simulated attacks on workers. A recent Naked Security survey shows that 85% of IT security professionals say it's good to send workers fake phishes with the aim of educating them about their vulnerability and getting them to change their behavior. Is there benefit in this approach to user education? Read More


WHITE PAPER: Cisco Systems

Economic Benefits of Cisco's Cloud Strategy
Private, public, hybrid--Cisco enables a world of many clouds with new levels of agility and security. This report from ACG Research looks how Cisco's cloud strategy improves economics beyond simple data center virtualization. Read Now

WHITE PAPER: Dell

Virtualization Streamlines Public Service Initiatives
Many municipal, county and state governments now deploy virtualized environments to enhance service levels, conserve energy and scale capacity within tight budgets. Find out how four government entities are using server, storage, and desktop virtualization to meet the challenges of today's government. Learn More

Why 'Agile Project Management Controls' Isn't an Oxymoron
George Carlin made phrases like 'jumbo shrimp' famous. But the need to control agile projects is no joke. Ask the right questions along the way, though, and you'll bring order to a process than can easily turn chaotic. Read More

How Benchmarking Can Improve IT Outsourcing Deals
As IT outsourcing has evolved so, too, have IT outsourcing customers' benchmarking needs. As a result, a new approach to benchmarking is necessary, a new method for establishing new and better ways of operating. Kathy Rudy, partner with outsourcing consultancy Information Services Group (ISG), discusses pros and cons of benchmarking for transformation and how to do it right. Read More


WHITE PAPER: CA Technologies

Application Performance Management: The End User is King
When it comes to critical applications and capabilities that impact end users and influence business results, the need for visibility into and across IT systems is critical. APM essentially creates a best-practice model that helps organizations focus on end-to-end monitoring, measuring and resolution of end-user problems. Learn More

Navy CIO: Use the cloud, but be careful
The U.S. Navy's CIO has directed that Naval information systems be migrated to commercial cloud service providers, but only for information that has already been approved for public release. Read More

Making sense of the myriad SDN offerings
With the range of software-defined networking (SDN) announcements coming from vendors large and small it is hard to figure out which SDN approach is best for what. Read More


WHITE PAPER: Riverbed

Setting Consolidating Expectations
New survey results from Forrester Consulting on consolidating branch offices are now available. Read: - Best practices in the face of more users, services, and devices - Consolidating beyond just servers - The importance of deploying advanced WAN optimization Read now.

Why Microsoft won't convert Windows XP holdouts
Microsoft did a pretty good job putting Internet Explorer 6 out to pasture, but it took a whole lot of nudging, cajoling, begging, and, finally, threatening some kneecaps to get people migrating. In the end, it took pushing IE 8 out as part of Patch Tuesday to finally retire the ancient browser. Now it's trying again with Windows XP. One year from now, Microsoft pulls the plug on XP support, and this... Read More

7 things you need to know about Bitcoin
Bitcoins are all the buzz. The virtual currency is riding a rollercoaster of speculation, rising exponentially in value and reaching a high of $260 this Wednesday before plummeting to $130. What's more, the largest bitcoin exchange in the world just survived a coordinated hack attack, and bitcoin-generating malware is spreading across Europe like wildfire via Skype. Read More

Microsoft Who? Top 4 Highlights of Microsoft Management Summit 2013
It's challenging to absorb everything Microsoft at the cadence they would like IT pros to keep pace with, but here are four areas to pay close attention to: Read More

 
 
 

SLIDESHOWS

Top 10 cloud tools

New tools help IT execs cut cloud costs, optimize resources, integrate and manage cloud instances.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How chipmakers are pushing PCs to blistering new levels

2. Hackers could start abusing electric car chargers to cripple the grid

3. iPad 5 rumor rollup for the week ending April 10

10. Google Death: Inactive account manager helps you plan digital last will and testament

9. 13 hot new open source projects

6. Windows 8: How to solve the Start Button dilemma

5. Two-factor authentication ready to roll out at Microsoft

4. Linux users don't buy software, but it's still worth selling

7. Hackers turn a Canon EOS camera into a remote surveillance tool

8. Startup aims SDN technology at Cisco WANs

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: