article thumbnail

3 lessons that CIOs learned in 2018

mrc's Cup of Joe Blog

Organization-wide, staff must be educated on security risks and resulting policies surrounding BYOD, printing, third-party software, remote workers, legacy equipment, vendor management, social engineering, outdated-training and security policies, and public or poorly protected WiFi. Now, am I saying that IT shouldn’t support the business?

article thumbnail

Why Organizations Fail to Secure Third-Party Remote Access

SecureWorld News

I think the most common risk and what we found in the research is that only 30% of those IT and security leaders we spoke with actually have a standardized strategy, approach, and methodology for allowing third-parties into critical systems and applications. So they might be designed to provide end-user support.