Remove Applications Remove End-User Support Remove Software Remove Training
article thumbnail

3 lessons that CIOs learned in 2018

mrc's Cup of Joe Blog

Many of them stem from known security issues like unencrypted data, unpatched software, common vulnerabilities, etc… In other words, issues that could’ve been corrected with a proactive approach to security. Now, am I saying that IT shouldn’t support the business? But, they spend time on tasks that they could offload to end users.

article thumbnail

Why Organizations Fail to Secure Third-Party Remote Access

SecureWorld News

I think the most common risk and what we found in the research is that only 30% of those IT and security leaders we spoke with actually have a standardized strategy, approach, and methodology for allowing third-parties into critical systems and applications. So they might be designed to provide end-user support.