All Slideshows | Page 21

    baselinemag.com

    The Key to Battling Cyber-Crime Begins With Users

    A day doesn't pass without news of a breach or security lapse somewhere in government or business. As a result, Americans are increasingly concerned about the risks posed by digital systems. Yet many do not follow basic security practices that re...read more
    baselinemag.com

    The Best Way to Use Data to Cut Costs? Delete It

    A recent mindset challenges the assumption that data storage costs will continue to decline and argues that collecting and indiscriminately storing data can be detrimental to business. The solution: deleting some data. In his thought pi...read more
    baselinemag.com

    How Gamification Tech Encourages Productivity

    A majority of organizations are taking advantage of gamification tech to enhance employee engagement, according to a recent survey from Badgeville. For the purposes of the research, gamification systems are defined as those that combi...read more
    baselinemag.com

    Why CIOs Must Spearhead the Digital Charge

    As the head of IT, a CIO must renovate the IT core to foster digital innovation, according to a new Gartner study. The study also concluded that as a business leader, a CIO must develop a strategic vision of how digital technology will t...read more
    baselinemag.com

    Your Organization Is Infected–Now What?

    Protecting your network from ransomware is an integral part of any network security framework for both individuals and companies. It's also important to have a plan of action once you know you've been stricken. Stu Sjouwerman, founder and CEO of KnowBe4, rea...read more
    baselinemag.com

    Why CIOs Need a Chief Data Officer

    The volume of data that CIOs and their teams oversee is growing immensely–increasing the need to hire a Chief Data Officer (CDO) if they don't already have one on board, according to a recent survey from Experian Data Quality. The report, titl...read more
    baselinemag.com

    8 Reasons to Update Your Approach to Data Security

    It's time to shift your thinking about data security, according to security and data experts at DataGravity, a data-aware storage platform. "Many people consider data security to be synonymous with perimeter security," said Perry Dickau, directo...read more
    baselinemag.com

    Why Risk Professionals Need More IT Support

    Governance, risk and compliance (GRC) professionals believe their current tech tools aren't capable of enabling them to monitor risk effectively, according to a recent survey from SAP. The report, titled "Managing Risk in an Age of Complexity," indicat...read more
    baselinemag.com

    Ten Truly Bizarre Help Desk Questions and Requests

    As a CIO, you should always convey your appreciation for good help desk workers. Especially those who are capable of fielding the following bizarre employee and user questions and requests, taken from a recent survey from Robert Hal...read more
    baselinemag.com

    Why IT Spends Too Much Time on Asset Management

    When it's time for a software or compliance audit, tech departments are spending too much time collecting asset inventory data and reconciling asset inventory sources, according to a recent survey from Enterprise Management Associates a...read more
    baselinemag.com

    How State CIOs Are Focusing on the Enterprise

    Most state CIOs are implementing enterprisewide strategies to best support business efforts and make better investment decisions, according to a recent survey from the National Association of State Chief Information Officers (NASCIO...read more
    baselinemag.com

    Known and Unknown Malware Continues to Grow

    A huge increase in zero-day attacks in 2014 on enterprise networks and mobile devices slammed companies, according to a new report by Check Point Research. There were 106 downloads of malware per hour compared to 2.2 per hour in 2013. "Only by arming t...read more
    baselinemag.com

    How to Use the IoT to Boost Business Revenue

    The vast majority of global organizations have adopted some form of Internet of things technology, and they're reaping the rewards of increased revenues as a result, according to a recent survey from Tata Consultancy Services (TCS). Th...read more
    baselinemag.com

    Why the 9 to 5 Work Day Is Fading

    With technology comes empowerment. And, in the case of CIOs and their teams, that empowerment often translates to the ability to self-determine work hours, according to a recent survey from CareerBuilder. The vast majority of workers, in fact, consi...read more
    baselinemag.com

    Ten Tips to Secure the Data Center

    Securing a data center can be challenging for a variety of reasons. You can't secure what you don't see, for example, and almost everything has remote access capabilities and IP addresses to interface with the Web. Too often, security takes a backseat, which le...read more
    baselinemag.com

    How to Successfully Migrate a Data Center

    What to do with a legacy data center is one of the most challenging questions CIOs face. After years of cycling people, hardware and software in and out of IT, CIOs often want to consolidate and streamline their data centers, but they'r...read more
    baselinemag.com

    Why Transformation Is a Top Business Priority

    More than nine out of 10 companies are either undergoing or preparing for a major transformation, according to industry research. And they're doing so because the potential consequences of "status quo" are severe, according to a recen...read more
    baselinemag.com

    How to Manage Skilled-but Difficult-IT Workers

    As a CIO, you probably have made this observation about your tech staffers: They're not like "normal" employees. Nor would you ever want them to be-because it's their combination of quirks, curiosity and talent that makes them so valuab...read more
    baselinemag.com

    IT Departments Are Lagging on BYOD Policies

    While most U.S. workers use a personal mobile phone for work, the vast majority of organizations are failing to implement bring-your-own-device (BYOD) policies to set guidelines for such usage, according to a recent survey from tyntec. CIOs and their I...read more
    baselinemag.com

    How M2M Powers the Internet of Things

    The Internet of things (IoT) is evolving rapidly and emerging at the center of a new digital era. One of the key components: machine-to-machine communication (M2M), which encompasses computing devices, sensors and other electronic systems that send and ...read more
First <1617181920212223242526> Last
(Page 21 of 105)