Tag: IT management
June 5, 2024 |
The Top 5 Areas of Your IT Ecosystem to Monitor in 2024
The value of IT system monitoring
In today’s complex IT ecosystems, extending equal protection across the entire network is simply not feasible. Instead, organizations need to determine which systems are inherently most critical and prioritize maintaining their operational integrity through...
June 2, 2020 |
Congratulations, you’re a CISO! Now what?
There is no escaping the fact that information security incidents can serious damage a company or even put it out of business. As organizations recognize the need to connect business risks with IT strategy, they are increasingly focusing on one person: their Chief Information Security Officer...
November 8, 2018 |
Security and Business Leadership: How CISOs Should Talk to the Board
In today’s digital world, a technology risk is a business risk. With data breaches and ransomware constantly making headlines and hitting revenue, boardrooms are finally accepting the importance of managing security risks more effectively. However, they still often see CISOs primarily as...
December 20, 2016 |
Security Practices: 3 Good Reasons to Gap Your Backup
Everyone knows how important it is to back up their data, right? Sadly, I feel like I should laugh after saying that because I know many people that don’t understand this basic concept. If you are reading this though, you are likely in the IT field, so should know that old saying: If you aren’t...
February 22, 2016 |
IT Security Standards: What Is Best for My Organization (Part 1)
While it was a common concern for computing people to implement security measures within their information assets, there has to be a “de facto”, meaning, the standards which focuses on the minimum solutions that addresses information security concerns on an industry or on a regulatory...
August 17, 2015 |
Securing SharePoint: How and Why
SharePoint is one of the easiest applications to deploy and install, but it is not easy to configure with full proof security. Many administrators just perform the basic deployment without much security configuration. There is no set configuration to make it fully secure, since every environment is...
March 3, 2015 |
4 Ways to Avoid Malware Like Lenovo Superfish
PCs sold by Lenovo between September 2014 and January 2015 came pre-installed with Superfish VisualDiscovery, a piece of malware claiming to improve users’ Internet experience by adding visual results to Google search and other websites. But in reality, the main purpose of the software was to add...
February 25, 2015 |
Internet Usage Policy Against Inappropriate Content
A recent posting in Spiceworks caught my attention. It seems that this admin was asked to generate an Internet usage report on a fellow employee. The next thing he knows, the employee was let go. Of course he felt somewhat guilty about it. Another poster was talking about a fellow user who has...
January 26, 2015 |
Ten Simple Ways to Prevent Security Breaches in SharePoint Server 2013
SharePoint server is one of the common applications in every organization. It’s used to share information and is accessed by all the teams in the organization helping people to share documents, calendars and much more – saving time on communication. Most of the Fortune 500 companies use...
January 22, 2015 |
Recon as a Hacker's Tool
There’s an expression I always remember from my military days, and it goes like this, “Whoever wins the recon war, wins the war”. This is very true, and nowhere is it truer than in the Wild West world of hacking. But keep in mind that styles vary. Often times this is driven by knowledge and...