Archive for the ‘IT policy’ Category

At one point or another, we’ve all been blindsided by news that has literally changed our lives. Though we’re often left momentarily stunned, it’s imperative to figure out how to adjust and carry on. It’s not always easy, but you know the expression – where there’s a will, there’s a way. However, the discontinuation of [...]

Encryption. For most organizations, the need for it is very apparent, but for some reason, its implementation often falls well short of goals and expectations. The obvious question here is: why? A recent Ponemon Institute study took a closer look at what exactly is giving enterprises such a headache when it comes to efficiently using [...]

Encryption has long been one of the most effective tools to prevent the exposure of sensitive data. As such, hackers are constantly working on new ways to crack encryption algorithms and exploit lapses in security. Information security professionals must be ever vigilant and constantly create innovative new methods to thwart attacks. Recently, one interesting new [...]

The convergent trends of BYOD, the consumerization of IT and mobility are causing rapid shifts in employees’ expectations for their work environment. Employees are driving the change by working remotely and on their own devices resulting in the workplace itself becoming increasingly flexible. These trends, combined with the blurring of boundaries between consumer and enterprise [...]

Chances are if you’re reading this blog, you understand how vital it is for enterprises today to secure remote access to their corporate networks. It looks like that understanding is becoming more widespread – according to recent research by TechTarget and Computer Weekly, network security topped the list of IT professionals’ networking priorities in 2014. [...]