All Slideshows

    baselinemag.com

    Reducing the Time an Intruder Spends in the Network

    A majority of IT security executives are only somewhat confident in their enterprise's security, according to a new survey. One-third of respondents are confident in their security posture and one-quarter said they communicate effectively about...read more
    baselinemag.com

    The Worst Jaw-Dropping Resume Blunders

    Like many hiring managers, CIOs are pressed for time when reviewing job applications. Most employers, in fact, spend less than five minutes reviewing a single resume, according to a recent survey from CareerBuilder. Knowing that they have a lim...read more
    baselinemag.com

    Why IT Budgets Are Up but Hiring Is Down

    The latest, quarterly “Reality Check” survey from TEKsystems presents a mixed bag of sentiments among CIOs and other IT leaders: IT budgets are on the rise, findings show, but hiring expectations are significantly lower than they ...read more
    baselinemag.com

    Why Customer Service Has Social Problems

    When it comes to pursuing customer service inquiries and complaints, users are taking an out-with-the-old-in-with-the-new approach, according to a recent survey from Desk.com. In this case, "old" refers not only to phone calls, ...read more
    baselinemag.com

    The Return of the Malicious Attachment

    Malicious attacks have shifted from URL-based campaigns, which dominated last year, to campaigns that rely on attachments to deliver malware payloads, according to a new study. The study also found that phishing increasingly targets business users, and that...read more
    baselinemag.com

    Not Dialed In: The Top Conference Call Offenders

    They serve a useful purpose but—let's face it—conference calls can often seem like an experience to endure rather than an opportunity for collaborative excellence. As a CIO, you are inevitably asked to participate in these ...read more
    baselinemag.com

    Ten Fastest-Growing States for Tech Jobs

    If you're a CIO in the No. 1 state for tech-employment growth, you're not working anywhere near California, New York, Massachusetts, Texas or any of the other usual suspect states that show up on this type of list. Instead, "Go Midwest, young...read more
    baselinemag.com

    Why Insider Threats Are Inevitable

    The majority of surveyed security professionals, 62 percent, said insider threats have grown during the last year, according to a new report. A combination of factors are at play: 53 percent attribute the rise to insufficient data protection strategies and solu...read more
    baselinemag.com

    The Key to Battling Cyber-Crime Begins With Users

    A day doesn't pass without news of a breach or security lapse somewhere in government or business. As a result, Americans are increasingly concerned about the risks posed by digital systems. Yet many do not follow basic security practices that re...read more
    baselinemag.com

    The Best Way to Use Data to Cut Costs? Delete It

    A recent mindset challenges the assumption that data storage costs will continue to decline and argues that collecting and indiscriminately storing data can be detrimental to business. The solution: deleting some data. In his thought pi...read more
    baselinemag.com

    How Gamification Tech Encourages Productivity

    A majority of organizations are taking advantage of gamification tech to enhance employee engagement, according to a recent survey from Badgeville. For the purposes of the research, gamification systems are defined as those that combi...read more
    baselinemag.com

    Why CIOs Must Spearhead the Digital Charge

    As the head of IT, a CIO must renovate the IT core to foster digital innovation, according to a new Gartner study. The study also concluded that as a business leader, a CIO must develop a strategic vision of how digital technology will t...read more
    baselinemag.com

    Your Organization Is Infected–Now What?

    Protecting your network from ransomware is an integral part of any network security framework for both individuals and companies. It's also important to have a plan of action once you know you've been stricken. Stu Sjouwerman, founder and CEO of KnowBe4, rea...read more
    baselinemag.com

    Why CIOs Need a Chief Data Officer

    The volume of data that CIOs and their teams oversee is growing immensely–increasing the need to hire a Chief Data Officer (CDO) if they don't already have one on board, according to a recent survey from Experian Data Quality. The report, titl...read more
    baselinemag.com

    8 Reasons to Update Your Approach to Data Security

    It's time to shift your thinking about data security, according to security and data experts at DataGravity, a data-aware storage platform. "Many people consider data security to be synonymous with perimeter security," said Perry Dickau, directo...read more
    baselinemag.com

    Why Risk Professionals Need More IT Support

    Governance, risk and compliance (GRC) professionals believe their current tech tools aren't capable of enabling them to monitor risk effectively, according to a recent survey from SAP. The report, titled "Managing Risk in an Age of Complexity," indicat...read more
    baselinemag.com

    Ten Truly Bizarre Help Desk Questions and Requests

    As a CIO, you should always convey your appreciation for good help desk workers. Especially those who are capable of fielding the following bizarre employee and user questions and requests, taken from a recent survey from Robert Hal...read more
    baselinemag.com

    Why IT Spends Too Much Time on Asset Management

    When it's time for a software or compliance audit, tech departments are spending too much time collecting asset inventory data and reconciling asset inventory sources, according to a recent survey from Enterprise Management Associates a...read more
    baselinemag.com

    How State CIOs Are Focusing on the Enterprise

    Most state CIOs are implementing enterprisewide strategies to best support business efforts and make better investment decisions, according to a recent survey from the National Association of State Chief Information Officers (NASCIO...read more
    baselinemag.com

    Known and Unknown Malware Continues to Grow

    A huge increase in zero-day attacks in 2014 on enterprise networks and mobile devices slammed companies, according to a new report by Check Point Research. There were 106 downloads of malware per hour compared to 2.2 per hour in 2013. "Only by arming t...read more
123456> Last
(Page 1 of 86)
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date