Understanding the emerging world of ‘fake everything’ is vital for figuring out what you and your company can do about it.
Business Intelligence, Security
Mike Elgan (Computerworld (US))30 September, 2017 21:00
Credit: Michael Kan / IDG
"Information wants to be free."
That was the motto of truth-seeking digital activists in the '80s and '90s.
The motto today is: "Information…
Is your digital transformation mobile-first? It should be
Innovative Ideas, Productivity, Security
By Galen Gruman
Executive Editor, CIO | APR 23, 2018 3:00 AM PT
Your mobile strategy — both for internal use and in support of your customers — is a bellwether of your approach to digital transformation.…
How to Know Whether IoT Devices Are Safe
Security
Samuel Greengard
Added to IoTplaybook or last updated on: 04/17/2018
It’s no news flash that Internet of Things (IoT) vendors, in a rush to get products to market, don’t always focus on security. In recent years,…
6 Ways the Workplace Will Change in the Next 10 Years
Business Intelligence, Innovative Ideas, Productivity, Security, Sustainability
December 15, 2017
Contributor: Sharon George
HUMAN RESOURCE
For heads of HR, the ability to peer into the future will make work infinitely easier.
Current trends in business and technology show…
What is disaster recovery and how can this benefit your business?
Security, Sustainability
Businesses face disaster every second of every day. Malicious actors could be preparing to hack their online platform, strong winds could leave them without power, or employee negligence may result in customer data falling into the wrong…
Top technology trends for 2018
Business Intelligence, Innovative Ideas, Managed Network Services, Managed Print Services, Productivity, Security
It is that time of the year again and 2017 is over before we knew it. The Year of Intelligencebrought us a lot of progress and change; from over-hyped ICO’s to algorithms that created secret languages. As every year since 2012, I provide…
Protect Your Organization From Cyber and Ransomware Attacks
Security
February 14, 2018
Contributor: Laurence Goasduff
SECURITY
Patching and removing web server vulnerabilities will improve enterprise security through 2021.
Alison, chief information security officer at…
How to Manage Your Reputation in the Wake of a Cybersecurity Incident
Managed Network Services, Security
After a cyber attack, customer and partner interactions can determine whether a company survives.
by
Eden Gillott Bowe
Twitter
Eden Gillott Bowe, president of reputation management firm Gillott Communications,…
Why developing an internal cybersecurity culture is essential for organizations
Managed Network Services, Security
Help Net Security February 7, 2018
[Free CISSP Exam Study Guide] Get expert advice that will help you pass the CISSP exam: sample questions, summaries of all 8 CISSP domains and more!
ENISA published a report providing…
How to print anything, anyplace, anytime, on any network.
Innovative Ideas, Managed Print Services, Productivity, Securityhttps://www.youtube.com/watch?v=_TfuwXObC0I&index=2&list=PLsX3eJ1gB1_A1-V0tNpnSbqQwf6BqL2Fbv%3D_TfuwXObC0I&index=2&list=PLsX3eJ1gB1_A1-V0tNpnSbqQwf6BqL2Fb&utm_source=socialondemand.external.xerox.com&utm_medium=Xerox…