All Slideshows | Page 20

    Reducing the Time an Intruder Spends in the Network

    A majority of IT security executives are only somewhat confident in their enterprise's security, according to a new survey. One-third of respondents are confident in their security posture and one-quarter said they communicate effectively more

    The Worst Jaw-Dropping Resume Blunders

    Like many hiring managers, CIOs are pressed for time when reviewing job applications. Most employers, in fact, spend less than five minutes reviewing a single resume, according to a recent survey from CareerBuilder. Knowing that they have a more

    Why Customer Service Has Social Problems

    When it comes to pursuing customer service inquiries and complaints, users are taking an out-with-the-old-in-with-the-new approach, according to a recent survey from In this case, "old" refers not only to phone calls, more

    The Return of the Malicious Attachment

    Malicious attacks have shifted from URL-based campaigns, which dominated last year, to campaigns that rely on attachments to deliver malware payloads, according to a new study. The study also found that phishing increasingly targets business users, and more

    Not Dialed In: The Top Conference Call Offenders

    They serve a useful purpose but—let's face it—conference calls can often seem like an experience to endure rather than an opportunity for collaborative excellence. As a CIO, you are inevitably asked to participate in these more

    Ten Fastest-Growing States for Tech Jobs

    If you're a CIO in the No. 1 state for tech-employment growth, you're not working anywhere near California, New York, Massachusetts, Texas or any of the other usual suspect states that show up on this type of list. Instead, "Go Midwest, more

    Why Insider Threats Are Inevitable

    The majority of surveyed security professionals, 62 percent, said insider threats have grown during the last year, according to a new report. A combination of factors are at play: 53 percent attribute the rise to insufficient data protection strategies and more

    The Key to Battling Cyber-Crime Begins With Users

    A day doesn't pass without news of a breach or security lapse somewhere in government or business. As a result, Americans are increasingly concerned about the risks posed by digital systems. Yet many do not follow basic security practices that more

    The Best Way to Use Data to Cut Costs? Delete It

    A recent mindset challenges the assumption that data storage costs will continue to decline and argues that collecting and indiscriminately storing data can be detrimental to business. The solution: deleting some data. In his thought more

    How Gamification Tech Encourages Productivity

    A majority of organizations are taking advantage of gamification tech to enhance employee engagement, according to a recent survey from Badgeville. For the purposes of the research, gamification systems are defined as those that more

    Why CIOs Must Spearhead the Digital Charge

    As the head of IT, a CIO must renovate the IT core to foster digital innovation, according to a new Gartner study. The study also concluded that as a business leader, a CIO must develop a strategic vision of how digital technology will more

    Your Organization Is Infected–Now What?

    Protecting your network from ransomware is an integral part of any network security framework for both individuals and companies. It's also important to have a plan of action once you know you've been stricken. Stu Sjouwerman, founder and CEO of KnowBe4, more

    Why CIOs Need a Chief Data Officer

    The volume of data that CIOs and their teams oversee is growing immensely–increasing the need to hire a Chief Data Officer (CDO) if they don't already have one on board, according to a recent survey from Experian Data Quality. The report, more

    8 Reasons to Update Your Approach to Data Security

    It's time to shift your thinking about data security, according to security and data experts at DataGravity, a data-aware storage platform. "Many people consider data security to be synonymous with perimeter security," said Perry Dickau, more

    Why Risk Professionals Need More IT Support

    Governance, risk and compliance (GRC) professionals believe their current tech tools aren't capable of enabling them to monitor risk effectively, according to a recent survey from SAP. The report, titled "Managing Risk in an Age of Complexity," more

    Ten Truly Bizarre Help Desk Questions and Requests

    As a CIO, you should always convey your appreciation for good help desk workers. Especially those who are capable of fielding the following bizarre employee and user questions and requests, taken from a recent survey from Robert more

    Why IT Spends Too Much Time on Asset Management

    When it's time for a software or compliance audit, tech departments are spending too much time collecting asset inventory data and reconciling asset inventory sources, according to a recent survey from Enterprise Management Associates more

    How State CIOs Are Focusing on the Enterprise

    Most state CIOs are implementing enterprisewide strategies to best support business efforts and make better investment decisions, according to a recent survey from the National Association of State Chief Information Officers ( more

    Known and Unknown Malware Continues to Grow

    A huge increase in zero-day attacks in 2014 on enterprise networks and mobile devices slammed companies, according to a new report by Check Point Research. There were 106 downloads of malware per hour compared to 2.2 per hour in 2013. "Only by arming more

    How to Use the IoT to Boost Business Revenue

    The vast majority of global organizations have adopted some form of Internet of things technology, and they're reaping the rewards of increased revenues as a result, according to a recent survey from Tata Consultancy Services (TCS). more
First <1516171819202122232425> Last
(Page 20 of 104)