Breaches have companies spooked, investing in security

It’s only natural: Following a major security breach, IT is going to be pretty concerned that they could be next. And judging by increases in spending, plenty of decision-makers are worried as well. 

Creating better passwords (that users can actually remember)

Just about every day there’s a news story that the age of passwords is almost over. Something – anything – more secure and easier to use is about to replace them once and for all. We won’t hold our breath. 

Microsoft and Google fight, we all lose

Conflicting policies on how and when to address patches left IT with the possibility of a zero-day attack. The cause of that gap in protection: Microsoft and Google didn’t quite see eye-to-eye on when patches need to be made available.

Insider leak: 350,000 financial accounts compromised

An employee at a branch office of a major financial institution has been fired for compromising 10% of its customers’ data. Here’s what you need to know to avoid a similar fate.

10 business tech predictions for 2015

As 2014 comes to a close, just about everybody is making their predictions for what the new year will hold. Some are continuations of trends we’ve already seen and some are brand new and sure to cause headaches. 

The Top 10 tech stories of 2014

Before we look ahead to next year’s challenges and promising developments, let’s take a look back at 2014’s biggest headlines.

6 keys for preventing cloud transition nightmares

Many organizations think that the prep work for a new cloud storage or hosting option is hardest part. But evaluating vendors, choosing a plan of attack and beginning the migration process can only be the beginning of companies’ problems.

IT hiring picks up: How to add (or retain) staff

When IT hiring accelerates, it can be good or bad news. On the one hand, companies are expanding their departments. On the other, you risk losing your best people to the competition.

Fired worker took sensitive information – and still wins in court

When this worker was fired from her job, she quickly sent sensitive information to a private email account. But when the company took her to court, a judge actually ruled in her favor. Find out why – and what you can do to avoid similar legal trouble. 

How much do companies monitor their BYOD users?

Most users who agree to BYOD policies do it reluctantly because of two main hang-ups: They are afraid of having personal devices wiped if they’re lost or stolen, and they don’t want IT to be able to monitor what they do on their phones.