Ban the Box seeks to prohibit companies from asking about criminal records on applications Proponents of Ban the Box want to prohibit employers from asking job candidates about their criminal history on an application. Read more Stop deceptive phishing emails with DMARC.org standards Dealing with the aftereffects of a phishing attack can be more than a little frustrating. One group is trying to fix that with a set of standards. Read more Insidious insiders: Psychology provides clues in handling invisible threats Dominic Vogel considers the insider threat risk in organizations and suggests that cross-departmental collaboration could help shore up data loss prevention methods. Read more Eight steps to restore an individual Exchange 2010 mailbox with System Center Data Protection Manager Exchange admins often have to restore an individual mailbox rather than an entire database. John Joyner shows you eight steps to do this using PowerShell commands and Microsoft System Center DPM. Read more Repurposed software: Apps gone rogue You come up with a dynamite app. Companies are thrilled with it. Next thing you know, your app is used to deny visitors access to a website. Michael Kassner considers repurposed software. Read more |
No comments:
Post a Comment