Amid the pandemic, using trust to fight shadow IT
With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate. (Insider Story)
With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate. (Insider Story)
Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.
Companies now have the opportunity to learn from what is and isn’t working during the coronavirus crisis. Use this time to build out a strategy so you won’t have to use band aids and duct tape next time.
Future generations will judge our response to the COVID-19 pandemic not only by our real-time public health and economic actions, but also by our post-pandemic regulatory choices. One of these choices will be how Congress should address the data privacy question, which is rising to new prominence as we embrace the notion that tech and…
I recently interviewed several CSOs and CISOs from the financial services, tech, healthcare, media and other industries to see how they were managing through these turbulent times. Below are the questions I asked them and a summary of their collective wisdom and best practices. While I would love to give these experts all the credit…
Suddenly countless numbers of people are working from home. This massive shift in work processes can have huge repercussions from a security, privacy, regulatory and data governance standpoint.
A crisis on the scale of the one we’re facing demands decisive action. Luckily for many IT leaders, the first move was easy: When COVID-19 work-from-home mandates hit, those with the right policies and infrastructure in place endured the massive shift to remote work with minimal disruption. Add VPN capacity, videoconferencing, and a healthy dose…
Insider Pro and CertsNexus have created a virtual classroom where subscribers can learn and test their cybersecurity readiness.
Congratulations. You’re now the chief security officer of your company’s newest branch office: Your home. Here’s how to manage your new job.
Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.
Protected by Virgil Security
Javascript not detected. Javascript required for this site to function. Please enable it in your browser settings and refresh this page.