Remove Applications Remove End-User Support Remove Software Remove Vendor Management
article thumbnail

3 lessons that CIOs learned in 2018

mrc's Cup of Joe Blog

Many of them stem from known security issues like unencrypted data, unpatched software, common vulnerabilities, etc… In other words, issues that could’ve been corrected with a proactive approach to security. Now, am I saying that IT shouldn’t support the business? But, they spend time on tasks that they could offload to end users.

article thumbnail

New CIO appointments in India, 2022

CIO Business Intelligence

Previously, he led the design, planning, implementation and delivery of IT managed services, cloud and security services, data centre and disaster recovery services at NTT. He has also worked with Reliance Communications, Global Tele-Systems, Mahindra Consulting, and Microtech Software and Consultants. November 2021.

article thumbnail

Why Organizations Fail to Secure Third-Party Remote Access

SecureWorld News

I think the most common risk and what we found in the research is that only 30% of those IT and security leaders we spoke with actually have a standardized strategy, approach, and methodology for allowing third-parties into critical systems and applications. This makes it really, really difficult to manage and very unwieldy and very costly.