Users, hackers are neck and neck in data breach damage

If you’re like the vast majority of companies that worry about a hacker stealing sensitive data, here’s a wake-up call: Hackers are only slightly more likely to steal identities than your own people are to accidentally put them out in the public for the whole world to see.

3 keys to learning from the worst day of your professional life

Most IT pros can look back on a failed project (and hopefully only one) and say, “Well that was a mess.” But at the end of the day, was anything really learned that would prevent it from happening again? 

3 reasons users break BYOD policies (and what you can do to stop it)

Hopefully, your organization is among the many that have implemented BYOD policies explaining what users can and can’t do with corporate info on mobile devices. And more than likely, you’ve had your fair share of of users who have broken the policy. 

BYOD offers promise, but takes its toll on IT departments

Mobile support is becoming more and more common. But while companies see the benefits, IT is often left struggling to support this influx of devices. 

Ransomware is a $24 million a year industry – and growing

According to the FBI, ransomware attacks took a huge financial toll in 2015. And one group is saying that 2016 will be “the year ransomware holds America hostage.” Find out what you can do to keep from falling victim. 

How the cloud is being used by companies now (and what’s next)

More than 90% 0f organizations are using at least one cloud app. But to what extent they’re on board and how they’re using it may surprise you. Find out what your colleagues are facing and where they’re going with the cloud next. 

Only a quarter of companies avoided data breaches last year

There’s a lot of different ways to show how serious the security problem is for organizations, but here’s a new way of putting it: Only one out of every four organizations managed to avoid cyberattacks in the past 12 months. 

Two-thirds of organizations think they’ve suffered mobile breaches

Mobile devices are often seen as a potential threat − one that could theoretically put data at risk someday. But a recent survey finds two-thirds of organizations believe they’ve already been hit by mobile malware and breaches. 

Sample data transfer and storage policy template

Storing and transferring data has never been easier for workers – or more dangerous. Here is a sample policy you can build off of in order to set rules and best practices for how users can transfer sensitive information without letting it fall into the wrong hands. 

IT’s feeling the pressure in 2016: Here’s help

Get ready for a rough year, if a recent report is to be believed.