The second half of 2020 brought more pandemic disruption to schooling and government services. K-12, higher education, and city and county governments continued to deal with disruptions, data breaches, and… Read more Cyber Incidents in the Second Half of 2020 →
Understanding the key findings of IBM’s Cost of a Data Breach Report 2020.
Some organizations require that any software installed on a network device or any hardware connected to the network be approved through their IT department. When users install software, apps, or hardware without informing IT, it’s known as shadow IT. Shadow IT can range from a workplace culture that promotes decentralized decision-making to individual users going “rogue” and installing technology without any approval. Let’s go over the benefits and pitfalls. The word “shadow” may have a negative connotation, but shadow IT isn’t all bad. When technology tools are chosen by the… Read more Shadow IT →
The world is on alert over the spread of Coronavirus. People are stressed, making plans to protect themselves by stocking up on masks and food, rearranging travel plans, and practicing… Read more Scammers and Current Events →