Though most companies have a written cybersecurity policy, it often remains unclear to the leadership team whether employees are actually adhering to the policy’s guidelines. A quick glimpse of the headlines will highlight daily instances of fallout from lax cybersecurity practices by employees. Researchers at Clutch, a company that helps businesses make better buying decisions, […]
Cybersecurity is a top concern of businesses today. While often thought of as an IT issue, cyberdefense tactics often have surprising overlaps with business strategies inherent to the finance department. As a result, more chief financial officers (CFOs) are becoming cybersecurity custodians.
The results of a new study from identity solution company HID Global appear to confirm a shift that many have suspected was coming. More and more, the management of physical access control solutions is coming under the control of information technology (IT) or information security. Researchers with HID Global collected survey results from more than […]
Most companies understand the need for a knowledge base—it’s essentially a virtual warehouse that stores important information, lessons, and tips your company has gathered over the years. However, just as important as it is to have a public, online knowledge base software, keeping a private, internal knowledge base is equally important.
Nearly half (46%) of entry-level employees don’t know if their company has a cybersecurity policy, according to new research from Clutch, a B2B research firm. The study also suggests that more communication and training on cybersecurity policies is needed for employees.
With perceptions of IT’s value and its status within an organization in constant flux, it can be difficult for IT leaders stay relevant. See how one IT executive navigated these tricky waters wherein technology’s role in business is often contradictory.
Like most other business initiatives, IT transaction success begins with setting and maintaining good expectations, from the very earliest discussions about an initiative through to its ultimate completion.
By following a path to shared services and standardization, IT leaders can set themselves up as more strategic partners within the business. It’s all in pursuit of that grand goal of turning the perception of IT from cost center to valued asset.
The stakes have never been higher for IT leaders when it comes to preventing cyberattacks and data breaches at their organizations. Read on for a few of the greatest cybersecurity fears of IT executives and what they do to address them.
When you’re just starting a major transformation of a business, it’s impossible to know what the outcome will be or what adjustments you’ll need to make along the way. However, you can take some steps to “futureproof” the project.