5 ways to say ‘No’ to your boss (and still keep your job)

It sometimes seems like part of IT’s job description is “Deliver the impossible on a regular basis (under budget, too). Execs know what they want – or think they do – but aren’t always concerned with the logistics behind it. 

Enterprise software is rife with vulnerabilities

Far too many organizations are making a serious mistake with their enterprise or in-house software: building it with open-source components that are flawed. 

Survey: Most companies fall short of uptime goals

A survey of customers has found that companies have lofty expectations for the amount of uptime they get each year, but the reality of what their providers deliver may not live up to those goals. 

Can you afford a data breach? Probably not

Everything is getting more expensive these days, and data breaches are no exception. Find out what’s sending the costs of breaches soaring, and what you can do to turn it around.

3 phishing attacks sneaking by IT’s defenses

IT pros know that phishing attacks are rampant. Most will train users to recognize the warning signs. But some recent attacks show that hackers are smart enough to try to stay one step ahead – and have devised attacks that can be successful even when users’ guards are up.

Public cloud: Is it right for your business?

In a few short years we’ve gone from an abstract thing called “the cloud” to more cloud providers and services than you can shake a stick at. But one fundamental question remains for many IT pros: Is it really safe to store your information in the public cloud?

Got ransomware? These free tools might help

Up until recently, if you were infected with ransomware, chances were you were out of luck. Today, it’s more accurate to say, if you’re infected with ransomware, you’re probably out of luck … but maybe, just maybe, not. 

The common thread in most successful attacks? Users

One of the largest annual studies of breaches and cybercrime has found attacks are getting more and more complicated, but most still succeed or fail from the biggest weak point in security: the end user.

30% of companies would cave to ransomware pressure

  It’s hard to tell any company what to do when it’s in a no-win situation where its data is being held ransom by hackers. Even though the smartest approach might be to stay strong and not cave to the pressure, when it’s your information at stake, it’s tough to take the moral stand. 

Cloud security fears aren’t holding companies back

While most companies will admit to being fearful of several aspects of the cloud – and one could say, with good reason – the overwhelming majority are still going all out on cloud services.