Every person within an organization can accidentally break the company’s information security policies if they are not careful.rnrnCyber security is a top concern in the IT industry today. In this series, we will look at various threats to cyber security and their corresponding information security policies – and what steps businesses can take to meet those threats head on.rn
When it comes to mobile apps, IT is now competing at the front end with hordes of consumer applications available to users. This has grown challenging, given the freedoms now associated with mobility. Users can download consumer apps that suit their fancy from just about anywhere. They choose the mobile devices and software that match their work styles and personal preferences.
Little did we know when we began experimenting with the novelty of cell phones and wireless networks that workplace mobility would morph into a primary enterprise computing model. And yet, here we are.
Sanjib Sahoo, CIO of Aperture Group, shares his methodology for building a team of IT leaders. Learn about the four key principles and the three-phase framework Sahoo uses to develop a class A team that performs at record speeds and delivers quality every time.
Just where on your IT to-do list does the work-life balance of your organization’s employees sit? Do you trust your telecommuters? How about “consumerizing” corporate apps so they have the same look and feel your organization’s employees are used to on their smart phones and tablets? rn
What is it about mobility that brings out the ad hoc in IT? According to the 2014 Global State of Information Security Survey by PricewaterhouseCoopers and CIO magazine, only 42 percent of companies have a mobile security strategy.
Even though we accept and often embrace the modern mobile workforce, many companies have not really sat down and thought about the needs of their employees and how they can capitalize on what is now a rather unique opportunity. This is where IT can play a strategic role. rn