Tag: compliance
-
Caveat Emptor: Security Issues Key in M&A Deals
Categories: SecuritySecurity costs It’s no secret that safeguarding business and customer data is a big concern for companies. In mergers and acquisitions (M&As) world, cyber-security is a hot button. With nearly 800 data breaches in the United State last year, according to Identity Theft Resource Center, coupled with the hefty cost of these attacks, acquirers are… Read more
-
Tying IT Projects to Business Results Is Crucial
Categories: News and TrendsIT investments Tying IT Projects to Business Results Is Crucial With LOB execs having more influence on how IT budgets are allocated, solution providers must focus more on how IT projects provide better business outcomes. Top IT Investment Considerations IT security leads the list at 70%, followed by improving customer/client experiences and controlling costs, which… Read more
-
How Businesses Waste Their Software Investments
Categories: Tech AnalysisSoftware asset management problems How Businesses Waste Their Software Investments The findings of new study serve as a wake-up call for C-level execs to implement software asset management/software license optimization solutions. Out of Compliance Licenses 75% of enterprises said at least some percentage of their software is overused; 32% report as much as 11% or… Read more
-
Making Sense of IT Perceptions and Realities
Categories: News and TrendsIT strategy Making Sense of IT Perceptions and Realities Solution providers should not only be aware of what customers perceive as their IT challenges but also understand what their actual operations issues are. Major Business Challenges Top challenges included standardizing and streamlining business processes (34%), too many manual processes (33%) and keeping up with demand… Read more
-
Privileged Account Takeovers Pose Major Risks
Categories: SecurityCyber security Privileged Account Takeovers Pose Major Risks Here’s a look at areas of high risk, such as privileged account takeovers, with which enterprises need help to improve their security. Account Takeovers 61% of respondents cited privileged account takeover as the most difficult stage of an attack to mitigate, up from 44% last year. Mitigation… Read more
-
Apple Devices Creating Blind Spot for IT Security
Categories: SecurityApple and IT security Apple Devices Creating Blind Spot for IT Security A recent study finds that most Apple devices used at work have little or no supervision from IT. A surprising percentage of these devices are employee-owned. Prevalence of Apple Devices in the Workplace 45% of workers surveyed use at least one Apple device… Read more