File sharing, drive-by downloads, social nets, phishing, malicious attachments -- according to a new report, these are the leading approaches for criminals targeting small and midsized businesses.
JDA SOFTWARE GROUP
JACK HENRY & ASSOCIATES
IXYS
ITRON
IRON MOUNTAIN INORATED
Tuesday, September 28, 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment