Analyst Research

Information Security Threat Report 2011

Security Threat Report 2011

To stay secure in 2011 and beyond, it’s vital that we understand how threats worked in 2010.  This report identifies the threats, the way they work, and provides insight into the tools and techniques available to protect your systems and data.  Topics covered include:
 
Identifying the threats - where to watch
-  Fake anti-virus software
-  Attacks using Internet marketing techniques
-  Social engineering techniques on social networks
-  Spam

What puts you at risk?
-  Passwords
-  Mobile devices and smartphones
-  Social networks
-  Software
-  Removable media
-  Operating systems
-  Web server security threats
 
 
Report by:


 

Reader Profiles
COO | CSO | CTO | IT Director | IT Management | Senior Management

Organisation Size
SMB | Enterprise

Document Info
Posted: 25-Jul-2011 Format: pdf Length: 52 pages Activity: 6530 views

Tagged with



To access this report please complete the short form on the right >>

Get Your FREE Report NOW!

By submitting this form, you agree to its Terms.


  • Print
  • Send to a friend