MS Office

Problem solve

  • Are cybersecurity lawyers necessary for organizations?

    Cybersecurity lawyers can help handle a variety of enterprise security issues, but are they necessary? Expert Mike O. Villegas discusses the potential benefits.Continue Reading

  • How to combat cloud-based gaming security risks

    There are many security risks for cloud-based gaming platforms. Expert Frank Siemons explains what's happened to gaming providers like Sony and Steam.Continue Reading

  • Developing an incident response policy: Avoiding pitfalls

    Does your enterprise have an effective incident response policy? Expert Kevin Beaver explains some of the mistakes that security managers should be avoiding.Continue Reading

  • Reduce or prevent healthcare cybersecurity attacks

    In this Q&A, the former CIO of Community Health Systems discusses how to prevent healthcare cyberattacks and lessons learned during his career.Continue Reading

  • OPM breach: What's the risk of exposed fingerprint data?

    Millions of fingerprint records were exposed in the OPM breach. Expert Michael Cobb explains how attackers can abuse such biometric data and what enterprises can do about it.Continue Reading

  • Benefits of single sign-on in healthcare

    Does your healthcare organization understand the benefits of single sign-on products? Learn how healthcare professionals quickly log on to multiple applications without much hassle.Continue Reading

  • Ask the expert: HIPAA breaches and the tech most likely to cause them

    It's safe to say HIPAA breaches should be avoided at all costs. One CISO discusses the technology most likely to cause a breach and what to do to ensure compliance.Continue Reading

  • Forming a DR/BC plan for the inevitable data breach

    According to one statistic, as of July 2015 there were, in total, almost 4 million applications available on the app stores of Amazon, Apple, BlackBerry, Google and Windows. This figure is only one reflection of how the technologies that enable our digital selves -- like mobile computing, cloud and social media -- have not only transformed the way we work, but also how we live. In light of the fact that we also now live in an increasingly cyberthreat-filled landscape, having a comprehensive DR/BC plan is no longer optional for enterprises, says SearchCIO columnist and former CIO Harvey Koeppel.

    In this SearchCIO handbook, Koeppel offers a list of DR principles CIOs can follow to help them design and implement a solid DR/BC plan that will protect both business and personal data when the next disaster strikes. In our second piece, CTO Niel Nickolaisen shares advice on how to get the most value out of DR testing -- without risking damage to your organization. In our last article, writer Mary K. Pratt gathers tips from DR experts on how to craft a DR/BC plan that can tackle any type of disaster, including data breaches.Continue Reading

  • How to handle a data breach: Managing public perception

    When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim.Continue Reading

  • Eight-step data breach plan for the IT organization

    A data breach plan that addresses the many variations a hack can take should consider these eight points.Continue Reading

  • The steps to effective cybersecurity incident response

    Planning and foresight are essential to any cybersecurity incident response plan. Follow these steps to make sure you're ready for a data breach.Continue Reading

  • How to handle a data breach: Managing public perception

    When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim.Continue Reading

  • Data protection and security incident response when all information is a target

    Data breaches have become increasingly commonplace for businesses, and every company that has an online presence is a potential target for hackers: High-profile hacks of Target Corp. and Anthem Inc., to name a few, show how valuable personal data has become to nefarious parties. In addition to customer data, companies must make sure sensitive company information such as trade secrets and intellectual property are protected as well. To face these constantly evolving data security threats, businesses have been forced to completely revamp their approach to information protection and embed security into data governance and business processes. In this handbook, learn about the pressing information security vulnerabilities facing modern companies and advice to implement governance strategies that keep your data secure.Continue Reading

  • Mastering the cloud contract

    Cynthia Nustad recalls a time not that long ago when businesses didn't have much flexibility in negotiating contracts with cloud providers. "Maybe you could negotiate on price or add-ons, but the core service was pretty vanilla and hardened," said the CIO at HMS, a healthcare management services company. Back then, agreements that had the provider assuming part of the risk in the event of a breach were a no-go. Today, however, things have markedly changed. The rapid growth of cloud computing has given IT leaders an edge when it comes to negotiating a cloud contract.

    In this issue of CIO Decisions, get advice from CIOs and experts on how to procure more safeguards and custom features in your cloud contract that address your business needs. Also in this issue, we walk through UPS' journey from analog to digital business; outline common mistakes companies make when implementing hybrid cloud; take a look at what's under the hood of Etsy's business model; talk to former McCormick CIO Jerry Wolfe about how the spice company is using its platform business model to shake up the food industry; and examine why getting the most out of knowledge workers today requires "Supportive Leadership."Continue Reading

  • Azure AD PowerShell supports MFA to protect authentication

    The preview of the Azure AD PowerShell module flexes its muscles by supporting MFA and device management.Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close