When someone in your organization starts using internet-connected devices without IT’s knowledge, that’s shadow IoT. Here's what you need to know about its growing risk.
James A. Martin |
05 Mar |
Read more
Access controls authenticate and authorize individuals to access the information they are allowed to see and use.
James A. Martin |
05 Feb |
Read more
Do Android phones get malware? Unfortunately, yes, but there are plenty of Android malware protection tools to save the day.
James A. Martin |
30 Oct |
Read more
Identity management tools provide IT managers with tools and technologies for controlling user access to critical information within an organization.
James A. Martin |
09 Aug |
Read more
Enterprise networks and data access can be knocked out without warning, thanks to natural and man-made disasters. You can’t stop them all from happening, of course, but with a good disaster recovery plan you can be better prepared for the unexpected.
James A. Martin |
24 Jul |
Read more
Enterprise networks and data access can be knocked out without warning, thanks to natural and man-made disasters. You can’t stop them all from happening, of course, but with a good disaster recovery plan you can be better prepared for the unexpected.
James A. Martin |
21 Jul |
Read more
Are departing employees taking data with them? Here’s what you need to know to better protect your enterprise network and proprietary information from insider threats.
James A. Martin |
28 Jun |
Read more
Consumers love talking to Alexa, Siri, Cortana and Google Now. But what should CIOs be doing to prepare for the growing use of virtual assistants among their employees?
James A. Martin |
19 Apr |
Read more
A lot of people right now are selling their old iPhones and iPad minis to trade up to the supersized iPhone 6 models. Unfortunately, I suspect some of them are being scammed out of their devices -- I nearly was.
James A. Martin |
12 Sep |
Read more