In a MIDMRKT Suite Survey of 212 IT executives in the midmarket, 76% of organizations allow for individually liable devices. In fact, of those 162 organizations, there are nearly 90,000 devices being used by employees for personal AND business use. How many of those devices have the “WhatsApp” downloaded today? Read Article Let’s review some daunting facts: Three years ago, Facebook exposed the world to Russian trolls filtering fake news stories to billions of people. Read Article. This displayed a vulnerability that the general population more or less accepted. Last year, they were found [ … ]
Avoiding a surprise attack from an opponent is difficult and nearly impossible to counter, as we’ve seen throughout history in examples of sports, chess, and warfare. In the cyber domain, this holds true for zero-day attacks or "surprise moves" as well. As cyber attackers refine their tactics and employ both evasive attack avenues and malware, security professionals must look for hints of intrusion within the sea of data. Below are four key preventative actions organizations can take to mitigate the impact or avoid a surprise attack on the network: Establish Ground Truth: Understand [ … ]
There is a major shift happening across the technology landscape for both vendors and IT professionals alike, but change in tech is the one thing we can expect. CIOs today must sharpen their cloud literacy and evolve toward more agile and scalable environments, which also means they must prepare to relinquish some control. We must embrace the shifts in order to adapt to employee's needs and market changes. Ten years ago, a savvy CIO when asked, “How much does your datacenter cost?” would smile and respond, “Nothing, it’s included in the rent”. His/her peers [ … ]
Compromised mission-critical systems spell disaster for a company. When disaster strikes, the key to recovery is having a move-forward plan. Are you confident in your company's disaster recovery plan? In desperate times, can you gain access to and restore critical business systems and access essential data? Do your employees know how to proceed? In an uncertain world, disaster recovery is crucial to weathering the storm. No matter how successful a business may be, the unexpected can wreak havoc for companies not prepared for the worst. Natural disasters and technological issues can threaten the security of your [ … ]
In our recent MIDMRKT CIO Forum survey, completed by 212 midmarket IT Executives, Business Process Automation (BPA) ranked 5th highest amongst their priorities, with nearly 20% of executives ranking BPA in their top three. Roughly 40% of executives plan to implement some form of BPA in the next 3-18 months. Two types of process automation that are quickly permeating the market are Digital Process Automation (DPA) and Robotic Process Automation (RPA). DPA and RPA are disparate technologies that serve similar goals, and deployed together can result in a powerful platform that changes business in fundamental ways, [ … ]