A word of advice – stop creating IT strategies, just to have an IT strategy. Over the years, I’ve talked with many CIOs about their pursuit to write a best in class IT strategy. A strategic CIO might say, “I created my IT strategy in conjunction with the business strategy,” forgetting the fact that no one on their team can dictate the main objectives of the actual document. An operational CIO might say, “We don’t need an IT strategy, our project timeline drives our success.” Strategic or operational, no matter where you find yourself on [ … ]
The MIDMRKT CIO Forum brings together top IT executives and solution providers in the midmarket space. After three days of collaboration, presentations, and networking, CIOs award the solutions providers that they see as strategic partners for their business during the “Vendor Excellence” ceremony. One standout vendor from the last two CIO Forums was @Risk Technologies. Winning multiple awards at the 2018 and 2019 CIO Forum, including the CIO Choice award, @Risk Technologies has proven to be a trusted and promising partner for the MIDMRKT CIO community. I sat down with CEO, Sean O’Brien to understand [ … ]
In a MIDMRKT Suite Survey of 212 IT executives in the midmarket, 76% of organizations allow for individually liable devices. In fact, of those 162 organizations, there are nearly 90,000 devices being used by employees for personal AND business use. How many of those devices have the “WhatsApp” downloaded today? Read Article Let’s review some daunting facts: Three years ago, Facebook exposed the world to Russian trolls filtering fake news stories to billions of people. Read Article. This displayed a vulnerability that the general population more or less accepted. Last year, they were found [ … ]
Avoiding a surprise attack from an opponent is difficult and nearly impossible to counter, as we’ve seen throughout history in examples of sports, chess, and warfare. In the cyber domain, this holds true for zero-day attacks or "surprise moves" as well. As cyber attackers refine their tactics and employ both evasive attack avenues and malware, security professionals must look for hints of intrusion within the sea of data. Below are four key preventative actions organizations can take to mitigate the impact or avoid a surprise attack on the network: Establish Ground Truth: Understand [ … ]