High Availability - Key to CIOs success
High Availability blog postingsRestoration Point Objectives Defined Maximum Tolerable Period of Disruption CIOs, CSOs, BC Managers constantly will work to improve their restoration point objective...
View Article5 skills that Disaster Recovery Business Continuity Pros Need to Have
Disaster Recovery Business Continuity skills Recent disasters, like Sandy, have showed that business continuity professionals can offer a great amount of assistance to their companies during a disaster...
View ArticleSecurity is a concern of CIOs with the increase in use of mobile devices
By definition, mobile devices are extending beyond corporate physical security controls and data on devices or transmitted over public Wi-Fi networks is at risk. Security is a key concern for CIOs as...
View ArticleSecurity issues that CIOs need to manage
Security is a critical issues as related in several posts:Related posts:Fraud is on the riseCIOs need to address fraud issues with better security For the last three years it has been reported that...
View ArticleCIOs stop hiring
Hiring for information technology workers stalled in March, according to a report by Janco Associates. Companies were reluctant to hire in an uncertain economy, and also were discouraged by the...
View ArticleDisaster Hits - All Computers are Down at AA
Disasters can also be computer generated as they were for American Airlines when grounded all its flights across the U.S. on April 14, after an unidentified computer problem hit its reservation system....
View ArticleDisaster Recovery Recap
Disaster Recovery posting recapHow to Evaluate your Disaster Recovery Plan Evaluating your disaster recovery plan To ensure the protection of your critical data, applications, and the continuous...
View ArticleProductivity news and trends summary
Productivity news and trends summaryRelated posts:CIO and Productivity CIOs drive productivity Looking ahead, managers and CIOs in particular have a focus on productivity. That not only applies to the...
View ArticleCMoO focus on Mobile Workers
CIOs are focusing on the mobile worker. The role of CMoO (Chief Mobility Officer) The executives, engineers, and sales representatives that are on the move are often responsible for bringing in new...
View ArticleSecurity Tip of the Week
While using wireless hotspots, limit activity to Web surfing only. A hotspot is an open wireless network that is available (open) to everyone. An example would be the wireless network at your favorite...
View ArticleCIOs are drivers of BYOD
Organizations that choose to support their employees' personal devices within a secure environment will measurably increase their business productivity as well as extend their employees' flexibility....
View ArticleHow to Implement IT Security
It is the CIO's and CISO's job to identify and present the risks the business may face, but its up to the board of directors to make the final decision on the acceptable level of risks. Security...
View ArticleMobile Device Use Policy Is Need
The consumerization of IT has wrought profound security issues and changes on how and where employees work. To unerstand the magnitude of this transformation, consider these statistics:3 out of 5...
View ArticleBYOD Challenges
Mobility has revolutionized how we do business. Managing mobility and BYOD means knowing how to navigate changing operating systems, changing platforms and changing hardware to reap benefits like...
View ArticleBusiness Continuity Digest
Top 10 Reasons Why Disaster Recovery Business Continuity Plans Fail In the recession many organizations put disaster recovery and business continuity on the back burner. As a result those plans are not...
View Article10 questions that need answers in an interview
In the inerview process a uniform front is important.. Before you start recruitng you should have answers prepared for questions like the following:Are responsibilities for this job completely defined?...
View ArticleInternert users are masking their identities
A Pew Internet and American Life study released last week showed that 86 percent of Internet users have made steps to remove or mask their identities online. Meanwhile, some companies are even trying...
View ArticlePersonalization is key to OmniCommerce
According to a recent study by IDG Research Services, personalization is recognized as a key differentiator among online businesses, for both e-commerce and non-commerce sites. Companies with an online...
View ArticleWhat is the cost of a business iinterruption?
Four steps that must be taken to determine if a business continuity plan is worth the investment are listed below. This will allow the organization to determine real dollar cost per downtime event,...
View ArticleChief Security Officer now a key role in many organizations
A few years ago, hiring a Chief Security Officer (CSO) would have been superfluous. However, as companies continue to expand their technological footprint, they are also more vulnerable to cyber...
View Article
More Pages to Explore .....