Six ways to prevent a breach like the one at AT&T
A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.
A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.
Most companies understand the risks associated with disaster recovery and business continuity and plan accordingly. Few can say the same thing about the software they own -- or don't own, as the case may be. That's where software asset management and software license management tools can make a difference.
Data recovery has mattered ever since businesses started relying on PCs in the workplace. Today's common storage options for small businesses all present some disaster recovery challenges. Here's what your organization should do to address them.
If your IT organization doesn't have a clear core strategy, it's easy to get caught up in--and spend too much on--technology trends. Learn about six CIOs' strategies for 2013 and see how they compare to your plans for the rest of the year.