By: James K. Davis Think a moment about the threats to your company’s data—and now think of how much worse they would be if those with access to your network were not well-trained, if there was lax or nonexistent discipline or company policies, or if a workstation was never actually used by the same person […]
Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.
Wearable tech has seen increased popularity but also increased scrutiny, particularly when it comes to privacy concerns. Even the devices built for simple fitness tracking are still subject to important safeguards. You’ve probably noticed more and more employees sporting Fitbit® devices lately—wearable gadgets that track everything from steps to sleep time to heart rate and […]
By: Israel Lifshitz Bring Your Own Device (BYOD) is considered a perk by many employees in the modern workforce—but it can be a real data security headache for IT. Read on for an expert’s opinion on how to craft and communicate a good BYOD policy, and how these programs are put to the test when […]
By James Pooley Employee mobility has become a fact of life as a competitive market fights for top talent. But what happens when an employee (IT or otherwise) defects to your direct competition? And worse, what if the defector knows a LOT about your internal operations, data, and processes? James Pooley, author of Secrets: Managing […]
Perhaps calling them the worst viruses in history is a bit of a stretch (after all, new viruses and data breaches are making new “history” every day), but they certainly did their share of damage. With cybersecurity remaining a top concern of IT professionals, the infographic below from Who Is Hosting This? outlines famous viruses […]
The following question was recently posed to the legal experts at BLR regarding wiping an employee’s personal phone:
Have you implemented (or are you considering implementing) a Bring Your Own Device (BYOD) policy? This trend just keeps growing. Employers are finding that many employees are more than happy to use their personal phones (and even tablets and computers) for work, since it means workers will be able to have a say in what […]