article thumbnail

3 lessons that CIOs learned in 2018

mrc's Cup of Joe Blog

Organization-wide, staff must be educated on security risks and resulting policies surrounding BYOD, printing, third-party software, remote workers, legacy equipment, vendor management, social engineering, outdated-training and security policies, and public or poorly protected WiFi. Offload these types of tasks to the end users.

article thumbnail

New CIO appointments in India, 2022

CIO Business Intelligence

Jai Menon has joined Skylo, a narrow-band satellite communications provider that targets IoT applications, as CIO. He will run the company’s ERP and order management systems, and manage IT support, business and operations support systems, networking, and security. Bhardwaj has over 20 years of experience in IT.

article thumbnail

Why Organizations Fail to Secure Third-Party Remote Access

SecureWorld News

I think the most common risk and what we found in the research is that only 30% of those IT and security leaders we spoke with actually have a standardized strategy, approach, and methodology for allowing third-parties into critical systems and applications. This makes it really, really difficult to manage and very unwieldy and very costly.