When it comes to protecting data, one of the biggest challenges for IT is getting users to follow best practices for password protection. However, many organizations try to enforce practices that do little to actually make passwords more secure.
In recent years, many victims of IT security incidents have filed data breach lawsuits. When are companies being held accountable after data is stolen?
IT training is a valuable tool businesses can use both to improve operations and provide an additional benefit to IT staff. How can IT managers make sure training is effective in meeting both of those goals?
IT managers face the difficult task of convincing Finance decision makers and other executives that IT security is a worthwhile investment. Here’s some new data that can help them make their case:
As cloud computing becomes the norm in most organizations, there’s a serious cloud security risk many companies aren’t doing enough to stop:
Most companies are confident their information is secure, but in reality, the data shows most organizations are struggling to deal with emerging IT security threats.
A company’s own employees are a much bigger threat to IT security than hackers, a new survey shows. Here are top ways users threaten security – and why IT departments fail to stop them.
While there were a lot of big IT news stories this year, BYOD was the topic that dominated our readers’ attention in 2012. These were the most popular IT Manager Daily stories of the past year, including posts on BYOD policies, mobile security and legal concerns introduced by personal devices.
Despite some significant cloud security concerns, many businesses are going forward with their plans to adopt cloud computing services — even when it requires uploading sensitive data to the Cloud.
This past year was a rough one for IT security. Hackers gained access to billions of sensitive records in 2012, using a mix of sophisticated new attacks and old techniques – as well as exploiting some big mistakes on the part of organizations.