Tag: security

person jumping in air with sneakers on fire

Information Management

Balancing the Opportunities and Risks of Machine Learning

Machine learning-based systems bring the potential for business growth, but also carry some challenges and risks. Being aware of the latter is the first step.

person sitting on a sofa working on a laptop with their feet up on a table

Information Management

How to Protect Employee Privacy and Ensure Data Security With a Remote Workforce

Now that remote work is mainstream, companies and employees alike need to review their approach to employee privacy and data security.

digital padlock image showing an open lock

Information Management

How Security Concerns Are Holding Back the Industrial Internet of Things

The IIoT has the potential to create competitive advantage for organizations, but its development is hindered by a number of issues, particularly security.

man in a black suit closes a red tape barrier to prevent access

Information Management

Why You Need to Protect Enterprise Social Networks From Attack

Collaboration platforms are enabling organizations to work remotely. But they also offer attackers new ways into the enterprise network. Here's what to do.

lamborghini parked in front of a hotel with a crowd surrounding it

Information Management

If You Want Your Software to Succeed, Don't Build Sports Cars Without the Roads

Companies often treat non-functional requirements and system design as an afterthought, overlooking essentials like security, monitoring and scaling.

whack a mole game on boardwalk at the shore

Information Management

So Many Breaches, So Little Proactive Action

Companies cannot rely on quickly aging security tactics to keep sensitive information protected. A proactive approach is the way forward.

A folded newspaper on a laptop - Workplace Newsbyte

Digital Workplace

Zoom's New Research on Remote Work, Box Cozies Up to Microsoft Teams & More News

In this newsbyte, Zoom eyes the return to the physical workplace, Box and Microsoft deepen their partnership for Teams, Fuze protects Teams data and more.

A broken security lock with a bullet hole on top of computer circuit board - Vulnerable data concept

Information Management

Microsoft Exchange Attack Underlines How Vulnerable Your Organizational Data Is

The attack on Microsoft Exchange has had global repercussions, although the full extent of the damage is still unclear.

photo of cheerful man running fast in front of a yellow background

Digital Workplace

Box Makes Cloud Content Migration Faster, DOJ Questions Salesforce’s Slack Buy & More News

Box makes migration easier, the Slack acquisition is under scrutiny, Microsoft unveils a new Office & Trend Micro identifies a file sharing flaw.

A big fishing hook with security locks - cybersecurity breach concept

Information Management

What the SolarWinds Hack Tells Us About the State of Cybersecurity

It may take years before the full damage from the SolarWinds hack is known, but it's shown that cybersecurity is a big issue in the business community.

looking behind the blinds

Information Management

How to Ensure Data Privacy in the Digital Workplace

Data privacy day is a good time to reexamine your data practices to ensure sensitive and personal information is secure. These best practices can help.

heart shaped lock

Information Management

Why You Need a Plan for Content Security in Microsoft 365

Microsoft 365 has a ton of great applications, all with their own security implications.

white beams of light on a black background

Information Management

Take Your Cloud Strategy Into the Future

Organizations that have not already developed a cloud strategy will have to do so this year in order to remain competitive. Here's why.

white book on a polka dot background with a text message saying do it

Digital Workplace

5 Digital Transformation Lessons to Take Into 2021

The digital workplace changed dramatically in 2020. Here are some lessons learned that enterprise leaders should take into 2021.

black and white photo of stairs heading up

Leadership

Hacker Takes Over Twitter Security, Zoom Adds a Big Name to Board and More People on the Move

Twitter taps a hacker to lead security, former Arizona governor joins Zoom, Limeade names a new CTO and McDonald's overhauls HR.

man typing on a laptop computer

Information Management

Now Is the Time to Replace VPN With Zero Trust

Virtual private networks are inadequate for the security needs of the modern connected enterprise. Here's why Zero Trust is in organizations' best interest.

person walking on a pathway with a shadow

Information Management

Should You Allow Shadow IT and BYOD in Your Company?

Remote work made 'bring your own device' an everyday reality. As that happens, companies need to keep an eye on shadow IT to mitigate the associated risks.

A man holding an abstract rubiks-style cube with business images - future transformation concept

Digital Workplace

Looking Beyond Digital Transformation

While many companies are still coming to terms with COVID's impact on the workplace, others are looking beyond digital transformation at what's next.

bank vault with multiple safe deposit boxes unlocked and open

Collaboration & Productivity

Is Your Business Data Safe in Slack and Microsoft Teams?

With communication and collaboration platforms now a mainstay, enterprise leaders are asking whether their company data is safe in these platforms. Here's why.

woman walking a tightrope between two mountains

Collaboration & Productivity

Striking the Security and Enterprise Collaboration Balancing Act

Organizations need solutions, processes and cultures that foster an ongoing dedication to information security without getting in the way of productivity.