Users get a lot of heat for poor password management, and it’s mostly justified. But a new survey from Centrify finds that IT can be just as guilty of sharing credentials, if not more so.
It’s not pessimism if you’re just being realistic. Nearly three-quarters of IT pros think they’ll be breached within the next 12 months, and they have good reasons for thinking so.
A lot has been made of so-called “shadow IT” in the last few years, but what does it actually look like to the average company? A new study shows that there’s plenty of money to go around for tech … but IT has its work cut out for it if it wants to control the spending.
New rules from the Department of Labor (DOL) could have a big impact on how IT employees are paid overtime – and the bottom line. And before you think, “No one in my department gets paid overtime,” know this: They soon may have to.
It sometimes seems like part of IT’s job description is “Deliver the impossible on a regular basis (under budget, too). Execs know what they want – or think they do – but aren’t always concerned with the logistics behind it.
Far too many organizations are making a serious mistake with their enterprise or in-house software: building it with open-source components that are flawed.
IT pros know that phishing attacks are rampant. Most will train users to recognize the warning signs. But some recent attacks show that hackers are smart enough to try to stay one step ahead – and have devised attacks that can be successful even when users’ guards are up.