Identity and access governance is not a technology project — it's a business transformation program. Organizationwide buy in is critical.
Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.
The decision by Consumer Reports to include security ratings in its product reviews could have implications for the way connected devices are designed.
Many common security practices and widely used tools such as firewalls and IDS fail to adequately address the challenges IT professionals face today.
IT leaders must develop a strong cybersecurity culture to promote awareness and accountability, and to empower employees to learn and develop.
User education and online safety training can be invaluable weapons against cyberthreats, especially for IT teams that are short on resources.
IT managers must make security personal to encourage employees in their organizations to adopt better security practices and improve their online hygiene.
By reusing passwords across multiple services, users make it easier for cybercriminals to breach all their accounts, not to mention company databases.
It is counterproductive to shame phishing victims because it discourages end users from alerting IT professionals of suspicious emails or activity.
IT professionals must stay informed and educate the users in their networks about the latest cybersecurity trends and threats.