At first, BYOD was something a few brave companies were giving a shot. Then it became a nice way to get users off corporate devices. Now company phones are rare and BYOD is becoming the norm. What’s the next hurdle for Bring Your Own Device? Keeping it from becoming a legal liability.
There was probably a time in your career when you were the only person in the company who had heard the term “the cloud,” let alone had any idea of how it works. But two new surveys show the problem might now be that everyone outside of IT feels like they know it all when […]
Threats to your company’s systems are always out there – from scammers, to hackers, to data breaches and outages. But when it comes to preparing for these incidents and their fallout, many companies take the approach of “we’ll deal with it if it comes up.”
A recent lawsuit shows that when it comes to protecting your systems, IT might not receive much help through legal avenues. In this case, former employees stole data, but the lawsuit against them had to be thrown out because it relies on a very old law.
IT pros have to master a variety of skills. But one that you definitely didn’t sign up for is hostage negotiations. Unfortunately, it looks like that might be yet another task thrown at you.
There are a few old rules with mobile apps: free apps are much riskier than paid, and iOS apps are more secure than Android. By a new study of the most popular apps on these platforms has some surprising results – ones that IT could find worrisome for mobile users.
You put a lot of time and effort into making sure your systems are secure and running efficiently. But a pair of surveys show that still might not be enough to stay safe in the face of a growing concern, shadow IT.
IT has never been strictly about technology. At least half the job is communicating effectively with users, higher-ups and others. But as most IT pros know, this is generally one of the areas that techs struggle with the most.
Anyone who has ever spent a long day at the office cleaning up after a security threat has probably wanted to curse out whoever made the vulnerable app. But a new study says that application isn’t always to blame – often, IT is.
You’ve heard the old saying “you can’t change what you can’t measure.” And one area that most definitely needs changing is the help desk if you ask users, IT managers and even the staffers who work in them.