Remove Guidelines Remove Information Security Remove Mobile Remove Trends
article thumbnail

AT&T Becomes the Latest Company Affected by Data Breach

CTOvision

The urgency of improving information security cannot be understated. Since the widely publicized attack on Target Corporation, data breaches have become increasingly common – sensitive information stored with both eBay and the California Department of Motor Vehicles has been compromised in the last six months alone.

Company 268
article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. If you have an Information Technology Blog you would like to suggest, please submit a listing. Help Net Security.

Resources 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Importance of an Online Encryption Policy

CTOvision

Though you may have the best IT department in the world and advanced computing resources, if there are no written methodical steps that will serve as guidelines or Standard Operating Procedure (SOP) for computing and data storage, then all these hiring-sprees of IT talents and investments are doomed to fail.

Policies 283
article thumbnail

Top Tech Websites 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. If you have an Information Technology Blog you would like to suggest, please submit a listing. Help Net Security.

Mobile 77
article thumbnail

E-book: Educate Yourself With Dell Insight Partner Views on Cybersecurity

Cloud Musings

The “Insight Partner Views on Cybersecurity” captures the latest news, trends and best practices surrounding cybersecurity by influential bloggers in the Dell Insight Partner program. Topics include: The chief information security officer (CISO) role in cybersecurity Security attacks and countermeasures Mobile device security U.S.

Dell 70
article thumbnail

7 technologies that CIOs can’t ignore in 2021

mrc's Cup of Joe Blog

One way to prepare: Secure portals. A portal lets employees access all their necessary information, securely via a web application. This includes the sharing of confidential files and messages where all information is encrypted in transit and at rest and stored on certified data centers.”. Automation technologies.

Storage 98