Remove Device Management Remove Security Remove Software Remove Survey
article thumbnail

Securing data and talent top Indian CIOs’ concerns for FY2023

CIO Business Intelligence

Cybersecurity will continue to be a top priority for Indian CIOs in the year ahead, according to a recent survey of technology executives by Gartner: 64% of Indian CIOs surveyed said they will increase their spending on security-related technologies in 2022, higher than the global average of 57%. Sustainability.

article thumbnail

Effectively Manage All Endpoints, No Matter Where They Are Located

CIO Business Intelligence

The 2021 PwC Remote Work Survey found that 83% of employers believe remote work has been successful, and 55% of managers said employees only need to work in the office three days a week or less to retain a strong culture. CIOs and CSOs still have to ensure that employees outside of the corporate firewall can do their work securely.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The BYOD Problem

Cloud Musings

To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on “Bring Your Own Device” (BYOD).

Mobile 70
article thumbnail

CIOs sharpen tech strategies to support hybrid work

CIO Business Intelligence

For example, Foundry’s 2022 State of the CIO survey shows that IT executives are investing in cybersecurity improvements and collaboration platforms better suited to their organizational needs as well as network reliability and performance improvements.

Strategy 142
article thumbnail

Are electronic medical records worth it?

Cloud Musings

It then took the agency several more years to publish initial security rules which directed “covered entities” (e.g., It then took the agency several more years to publish initial security rules which directed “covered entities” (e.g., Secure wireless networks – Wireless networks often introduce security vulnerabilities.

article thumbnail

The tech antitrust hearing was good, actually

The Verge

I’m sympathetic to Apple’s position here — these apps used mobile device management features that were not designed for this sort of thing and could easily have been abused — but it does show the company’s tremendous market power.). The news comes from a new survey conducted by the think tank Data for Progress.

Google 78