The top 10 IT stories of 2012

While there were a lot of big IT news stories this year, BYOD was the topic that dominated our readers’ attention in 2012. These were the most popular IT Manager Daily stories of the past year, including posts on BYOD policies, mobile security and legal concerns introduced by personal devices. 

1. BYOD Policy Template

Bring your own device (BYOD) programs call for three critical components: a software application for managing the devices connecting to the network, a written policy outlining the responsibilities of both the employer and the users, and an agreement users must sign, acknowledging that they have read and understand the policy. More …

2. Women in Technology Infographic: Triumphs and Barriers

Women have recently taken several notable positions at the forefront of big tech companies. Unfortunately, they remain the exception to the rule. Our infographic looks at the presence – or lack thereof – of women in technology, from dismal numbers to inspiring success stories and resources for supporting ambitious, tech-minded women. More …

3. Most users won’t choose a secure password, study says

Users who work with sensitive company information are told time and time again by IT: Choose a secure password to protect that data. But what’s the password most often employed by business users? More …

4. 7 ways BYOD could get you sued

IT consumerization and personal devices brought into work create some tricky legal issues companies must take into account when they develop a BYOD policy. More …

5. Can companies monitor or read personal email sent from work?

Do employees have a right to privacy when using personal email accounts, even when they send the messages at work? That depends on the situation, according to a few court cases that have tackled the subject. More …

6. Why IT will hate Windows 8

Microsoft’s newest OS is now in full swing. What do early adopters say about Windows 8? That depends on whether it’s installed on a tablet or a PC. More …

7. 5 mobile apps IT should ban to increase BYOD security

To protect mobile security, IT often focuses on keeping malware off of users’ phones and tablets. But there are plenty of legitimate mobile apps that can put data at risk, too. More …

8. The 25 costliest tech screw-ups of all time

All organizations depend on IT to keep operations up and running. That means tech mistakes – even seemingly minor ones – can have a huge impact on the organization and its bottom line. While the actual financial damage isn’t always possible to measure, these are 25 of the biggest, most famous and costliest tech screw-ups of all time: More …

9. What Obama’s re-election means for IT

While technology wasn’t addressed a whole lot during the presidential campaign, experts say Obama’s re-election will have an impact on IT – particularly in the areas of cyber security, privacy and piracy. More …

10. The latest mobile security threat: NFC hacking

Mobile security is becoming a big deal for companies as more users bring in their own personal smartphones and tablets. A presentation at this year’s Black Hat security conference detailed the latest threat those mobile devices might create. More …

Make Smarter Tech Decisions

Get the latest IT news, trends, and insights - delivered weekly.

Privacy Policy

Related Posts