The catastrophic Heartbleed bug, disclosed in early April, impacted hundreds of thousands of popular websites. It is considered one of the most significant, far-reaching vulnerabilities in the history of the Internet, made all the more unsettling because it’s entirely undetectable. Here’s what you can do to protect yourself and your company.
There’s risk enough when information is housed in a single location, but when data is shared between multiple devices – and particularly when files are transferred online – maintaining security becomes far more complex. Follow this guidance when choosing a file-sharing solution for your firm.
IT risk oversight is a hot topic for boards of leading companies. It is one of the critical components of an organization’s competitive advantage. Recent industry studies show that companies lose billions of dollars on failed IT-related projects that don’t reach their full potential. Because IT initiatives are usually enterprisewide, they naturally impact many aspects […]
All major IT-based software projects come with some degree of risk. The question, then, that needs to be answered is: In what way should executives step up and confront these issues before they become a major concern?
Serving on an audit committee is one of the most challenging, prestigious and fulfilling roles a business professional can play. It provides the opportunity to give back by sharing knowledge gained and lessons learned firsthand. And yet, the job’s inherent responsibilities can result in a very serious case of sleep deprivation. The results of the […]
The current high-risk environment creates an imperative for IT leaders to exploit information technology to manage risks both to existing assets and to future growth. IT should be used to enable systemic risk management by delivering a high-quality, reliable continuum of information from dispersed operations for heightened awareness, improved decision making and enhanced business performance.
In the second installment of ...