dcsimg

Were State and Local Government IT Teams Ready for COVID-19?

As lockdown measures and stay-at-home orders were launched to curb virus spread, IT found themselves with a slew of new responsibilities. … [Read more...]

CCTV is a Data Compliance Issue

As a company owner, you may well think that you can install closed-circuit television (CCTV) cameras as you see fit on company premises, but the reality is a little different. … [Read more...]

Rogue Device Detection And Prevention

How do we protect ourselves from rogue devices? What are the current solutions? … [Read more...]

6 Ways for Financial Institutions to Avoid Wire Fraud

Wire fraud is a federal offense under U.S. law and refers to fraud committed using electronic communications, such as telephone or computer. Unfortunately for financial institutions, wire fraud is on the increase, and not just in the U.S. … [Read more...]

HTTPS and A Padlock Does Not Mean A Website is Secure

Online shoppers are often encouraged to ensure that their chosen online stores are 'secure', that the 's' in HTTPS is visible, and that the web browser displays a lock symbol. Propagating these visible indicators as confirmation of website security is not only irresponsible; it's also dangerous. … [Read more...]

6 Issues That Sysadmins Should Consider When Everyone is Remote

With ‘social distancing’ a familiar term to most of us at this point, many companies have allowed their employees to work from home, given that the alternative is to cease operations entirely. But it brings a myriad of IT problems. … [Read more...]

Balancing Data Security and Information Sharing in Higher Education

Retaining openness and transparency while reducing cyber risk is the Holy Grail of educational IT and challenging to implement. … [Read more...]

Is Ethical AI Development Possible?

When you consider all the implications of a world where AI rules supreme, are ethics even possible? … [Read more...]

What Is Knowledge Management?

In this article, we dissect the term 'knowledge management' and discuss how it relates to information and data. … [Read more...]

4 Basics of Identity Access Management (IdAM) that IT Pros Should Know

Call it Identity Management (IDM) or Identity Access Management (IdAM); IT is responsible for its implementation and ongoing maintenance. … [Read more...]