Are you really getting the cloud uptime you expect?

One of the scariest things about putting information in the cloud is not knowing if you’ll always be able to access it. Companies want outstanding uptime, and providers promise it. But who’s checking if they’re actually delivering? 

10 keys for a BYOD policy that won’t get you sued

At first, BYOD was something a few brave companies were giving a shot. Then it became a nice way to get users off corporate devices. Now company phones are rare and BYOD is becoming the norm. What’s the next hurdle for Bring Your Own Device? Keeping it from becoming a legal liability. 

Pages: 1 2

Suddenly, everybody’s a cloud expert: What it means for IT

There was probably a time in your career when you were the only person in the company who had heard the term “the cloud,” let alone had any idea of how it works. But two new surveys show the problem might now be that everyone outside of IT feels like they know it all when […]

Businesses are less prepared for cyber threats than they think

Threats to your company’s systems are always out there – from scammers, to hackers, to data breaches and outages. But when it comes to preparing for these incidents and their fallout, many companies take the approach of “we’ll deal with it if it comes up.”

If former users stole data, why did the court give them a pass?

A recent lawsuit shows that when it comes to protecting your systems, IT might not receive much help through legal avenues. In this case, former employees stole data, but the lawsuit against them had to be thrown out because it relies on a very old law.

Does your company need a bribery policy?

IT pros have to master a variety of skills. But one that you definitely didn’t sign up for is hostage negotiations. Unfortunately, it looks like that might be yet another task thrown at you.

Majority of apps put mobile users at risk

There are a few old rules with mobile apps: free apps are much riskier than paid, and iOS apps are more secure than Android. By a new study of the most popular apps on these platforms has some surprising results – ones that IT could find worrisome for mobile users.

Shadow IT is still a huge problem

You put a lot of time and effort into making sure your systems are secure and running efficiently. But a pair of surveys show that still might not be enough to stay safe in the face of a growing concern, shadow IT. 

5 soft skills every tech must master

IT has never been strictly about technology. At least half the job is communicating effectively with users, higher-ups and others. But as most IT pros know, this is generally one of the areas that techs struggle with the most. 

Apps’ biggest security flaws could be IT

Anyone who has ever spent a long day at the office cleaning up after a security threat has probably wanted to curse out whoever made the vulnerable app. But a new study says that application isn’t always to blame – often, IT is.