Know who else shares passwords? IT depatments

Users get a lot of heat for poor password management, and it’s mostly justified. But a new survey from Centrify finds that IT can be just as guilty of sharing credentials, if not more so. 

73% of IT pros think they’ll be breached next year: Here’s why

It’s not pessimism if you’re just being realistic. Nearly three-quarters of IT pros think they’ll be breached within the next 12 months, and they have good reasons for thinking so. 

Technology budgets are changing: 3 ways to make sure IT still has control

A lot has been made of so-called “shadow IT” in the last few years, but what does it actually look like to the average company? A new study shows that there’s plenty of money to go around for tech … but IT has its work cut out for it if it wants to control the spending. 

Get ready to start dishing out overtime to your techs

New rules from the Department of Labor (DOL) could have a big impact on how IT employees are paid overtime – and the bottom line. And before you think, “No one in my department gets paid overtime,” know this: They soon may have to. 

5 ways to say ‘No’ to your boss (and still keep your job)

It sometimes seems like part of IT’s job description is “Deliver the impossible on a regular basis (under budget, too). Execs know what they want – or think they do – but aren’t always concerned with the logistics behind it. 

Enterprise software is rife with vulnerabilities

Far too many organizations are making a serious mistake with their enterprise or in-house software: building it with open-source components that are flawed. 

Survey: Most companies fall short of uptime goals

A survey of customers has found that companies have lofty expectations for the amount of uptime they get each year, but the reality of what their providers deliver may not live up to those goals. 

Can you afford a data breach? Probably not

Everything is getting more expensive these days, and data breaches are no exception. Find out what’s sending the costs of breaches soaring, and what you can do to turn it around.

3 phishing attacks sneaking by IT’s defenses

IT pros know that phishing attacks are rampant. Most will train users to recognize the warning signs. But some recent attacks show that hackers are smart enough to try to stay one step ahead – and have devised attacks that can be successful even when users’ guards are up.

Public cloud: Is it right for your business?

In a few short years we’ve gone from an abstract thing called “the cloud” to more cloud providers and services than you can shake a stick at. But one fundamental question remains for many IT pros: Is it really safe to store your information in the public cloud?