Threats to information security come in all shapes and sizes, and from all directions: blended threats, mass-mailer worms, Trojans, phishing attacks, spyware, keystroke loggers, etc. Every day, one or more of these threats put critical information at risk in Internet-connected corporations and businesses around the globe.

One of the biggest differences between the threats of today and those of yesterday is motive. It used to be that a hacker demonstrated his or her skills to gain notoriety or bragging rights within the hacking community.

The link for this article located at CIO Update is no longer available.