article thumbnail

3 lessons that CIOs learned in 2018

mrc's Cup of Joe Blog

Organization-wide, staff must be educated on security risks and resulting policies surrounding BYOD, printing, third-party software, remote workers, legacy equipment, vendor management, social engineering, outdated-training and security policies, and public or poorly protected WiFi.

article thumbnail

New CIO appointments in India, 2022

CIO Business Intelligence

He will run the company’s ERP and order management systems, and manage IT support, business and operations support systems, networking, and security. At SVKM he will be responsible for managing pan-India IT infrastructure including the network, applications, servers, end-user support team and web portal support.

article thumbnail

Why Organizations Fail to Secure Third-Party Remote Access

SecureWorld News

The other issue is the downtime and critical systems that are managed by a vendor. So as organizations spend more and more time trying to put in security controls, sometimes the result is they actually have more critical downtime events from vendor managed machines or infrastructure applications.