Not skeptical anymore: IT has serious concerns about connected devices

Wearables and other connected devices that make up what’s known as the Internet of Things (IoT) have long been more hype than substance. But now most IT pros agree these devices could pose serious security risks.

Here’s what a data breach will cost you now

The costs of a data breach can be huge. You stand to lose customers’ respect, confidence from the board and damage to your organization’s reputation. Oh, and did we mention $4 million on average?

5 soft skills every tech must master

IT has never been strictly about technology. At least half the job is communicating effectively with users, higher-ups and others. But as most IT pros know, this is generally one of the areas that techs struggle with the most. 

Everything you need to talk to the board about security: Experts weigh in

Nothing substantial gets done at companies without buy-in from the very top. But knowing how to get support from the decision-makers isn’t easy, and speaking their language can be even tougher. Fortunately, there’s help.

IT pros don’t feel much stress, but will bolt if they do

There’s a lot of talk about how stressful work in IT could be. But a recent survey finds those at the top of their departments are overall pretty satisfied with their work.

The changing role of the CIO: What it means for you

Anyone who has held the title of CIO or its equivalent probably won’t be surprised to learn that it’s undergoing a huge change these days. And according to a new study, there are plenty of challenges associated with this position as well.

IT pros see cloud adoption as essential, but aren’t all-in yet

Most everyone you ask in IT agrees that the cloud is useful to their employers’ long-term business needs. But don’t look for companies to be mostly in the cloud any time soon.

5 ways to keep cloud vendors honest

Companies are more reliant than ever on their cloud vendors to provide outstanding service at reasonable prices. But all too often, that’s not what’s delivered. Here’s some strategies you can use to make sure you’re actually getting what you expect.

Are third-parties putting your organization at risk?

It can be hard enough to manage your own security, but most companies have at least one partner that could be introducing security risks into the organization.

Users, hackers are neck and neck in data breach damage

If you’re like the vast majority of companies that worry about a hacker stealing sensitive data, here’s a wake-up call: Hackers are only slightly more likely to steal identities than your own people are to accidentally put them out in the public for the whole world to see.