IT pros have to master a variety of skills. But one that you definitely didn’t sign up for is hostage negotiations. Unfortunately, it looks like that might be yet another task thrown at you.
In addition to preventing data breaches, companies also must make sure they learn from incidents to improve their protection in the future. Part of that requires knowing who or what is to blame for a breach, as George Hillston discusses in this guest post.
IT departments often struggle with getting users to choose secure passwords and keep them safe. For help, here’s a password policy template companies can use to create their own written rules.
Many data security breaches are blamed on user mistakes. But IT’s security strategy is often to blame for those errors.
Employees are often careless when it comes to sensitive information on mobile devices, and BYOD policies have done little to change things. What can IT do?
As we’ve written before, when employees use personal devices at work, it can create a number of tricky legal concerns for businesses. Here’s one compliance issue a recent survey says many firms are struggling with: