6 IT Security Strategies for 2009

  • By

    Sharon Linsenbach

    | Posted 2009-02-11
  • Email
 
 
 
Previous
No Title
Next
Spammers and cybercriminals are working harder than ever to develop ever-sneakier ways to launch an attack. In anticipation of a 2009 filled with increasingly sophisticated threats from spammers, here are some top strategies IT and security pros can use to thwart the bad guys, compiled from security experts from MXLogic, Websense and Bell Micro.
Spammers and cybercriminals are working harder than ever to develop ever-sneakier ways to launch an attack. In anticipation of a 2009 filled with increasingly sophisticated threats from spammers, here are some top strategies IT and security pros can use to thwart the bad guys, compiled from security experts from MXLogic, Websense and Bell Micro.
 
 
Sharon Linsenbach Sharon Linsenbach is a staff writer for eWEEK and eWEEK Channel Insider. Prior to joining Ziff Davis, Sharon was Assistant Managing Editor for CRN, a weekly magazine for PC and technology resellers. Before joining CRN, Sharon was an Acquisitions Editor for The Coriolis Group and later, Editorial Director with Paraglyph Press, both in Scottsdale, AZ. She holds a BA in English from Drew University and lives in the Philadelphia suburbs with her significant other and two neurotic cats. When she's not reading or writing about technology, Sharon enjoys yoga, knitting, traveling and live music. Sharon can be reached at Sharon.Linsenbach@ziffdavisenterprise.com.
 
 
 

Submit a Comment

Loading Comments...
























 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date