Colocation centers

Training News

View All News

Training Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Training Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Training

Learn to apply best practices and optimize your operations.

  • Six must-haves for IT's mobile security checklist

    Enterprises are constantly bombarded by mobile security threats, and it's up to IT pros to thwart them. There are six key items that belong on IT's mobile security checklist. Continue Reading

  • To defend endpoint security in healthcare, technology teams with training

    At many hospitals and physician practices, endpoint devices -- such as desktop computers, laptops and smartphones -- can become areas for cybercriminals to exploit. However, a combination of high-tech defense and old-fashioned common sense offer potent protection against endpoint breaches.

    This handbook starts off with an article that looks at the security aspects of patient data on mobile devices and how those devices can work with storage technology. It may be best, when possible, to steer clear of storing personal health information on smartphones and tablets. Instead, look to back-end storage options.

    Next, readers can learn about HIPAA breaches and endpoint security in a Q&A with a hospital interim CIO. He recommends using multifactor authentication -- in other words, the practices of using at least two different credentials to verify a user's identity -- as a prime way to protect patient data from breaches that could violate HIPAA requirements.

    The final article pinpoints the security advantages offered by a virtual desktop infrastructure (VDI), which can help medical facilities sidestep data breaches while physicians use mobile devices.

    These high-tech efforts, combined with improved end-user education, can help clinicians and others in hospitals and physician practices avoid lurking digital dangers that threaten endpoints.

     Continue Reading

  • What is the most important technology for a virtual contact center?

    An expert shares four technologies that are key to successful virtual contact centers: integrated contact routing, workforce management, computer-based training and gamification tools. Continue Reading

View All Manage

Problem Solve Training Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close