6 keys for preventing cloud transition nightmares

Many organizations think that the prep work for a new cloud storage or hosting option is hardest part. But evaluating vendors, choosing a plan of attack and beginning the migration process can only be the beginning of companies’ problems. 

IT hiring picks up: How to add (or retain) staff

When IT hiring accelerates, it can be good or bad news. On the one hand, companies are expanding their departments. On the other, you risk losing your best people to the competition.

Fired worker took sensitive information – and still wins in court

When this worker was fired from her job, she quickly sent sensitive information to a private email account. But when the company took her to court, a judge actually ruled in her favor. Find out why – and what you can do to avoid similar legal trouble. 

How much do companies monitor their BYOD users?

Most users who agree to BYOD policies do it reluctantly because of two main hang-ups: They are afraid of having personal devices wiped if they’re lost or stolen, and they don’t want IT to be able to monitor what they do on their phones. 

3 phishing attacks to watch out for

The reason phishing attacks remain popular is they’re extremely effective. The best ones can go nearly undetected and can cause devastating damage to companies. Here are three active attacks you’ll want to keep an eye on – and make sure your users are aware of.

Sample BYOD policy template

Bring your own device (BYOD) programs call for three critical components: a software application for managing the devices connecting to the network, a written policy outlining the responsibilities of both the employer and the users, and an agreement users must sign, acknowledging that they have read and understand the policy. 

Heads up: Mobile security incidents are on the rise

Forget the Internet of Things. IT is still struggling to keep up with another, well-established threat: mobile security incidents. And research shows this one’s getting more and more costly. 

Sample data transfer and storage policy template

Storing and transferring data has never been easier for workers – or more dangerous. Here is a sample policy you can build off of in order to set rules and best practices for how users can transfer sensitive information without letting it fall into the wrong hands. 

Problems with passwords: Users hate them, can’t remember them

A new survey highlights several problems with passwords: They’re forgettable, inefficient and users would rather listen to “The Macarena” than put up with them. (No, seriously. They would.)

Gear up for 2015: Gartner predicts its Top 10

As we move into the fourth quarter of 2014, it’s getting to be about that time to look into the future and start planning for the next year’s priorities. Research firm Gartner is getting a bit of a jump on things by predicting what the biggest tech trends of 2015 will be.