Remove Applications Remove End-User Support Remove Training Remove Vendor Management
article thumbnail

3 lessons that CIOs learned in 2018

mrc's Cup of Joe Blog

Organization-wide, staff must be educated on security risks and resulting policies surrounding BYOD, printing, third-party software, remote workers, legacy equipment, vendor management, social engineering, outdated-training and security policies, and public or poorly protected WiFi. Offload these types of tasks to the end users.

article thumbnail

Why Organizations Fail to Secure Third-Party Remote Access

SecureWorld News

I think the most common risk and what we found in the research is that only 30% of those IT and security leaders we spoke with actually have a standardized strategy, approach, and methodology for allowing third-parties into critical systems and applications. This makes it really, really difficult to manage and very unwieldy and very costly.