Reports of the death of File Transfer Protocol (FTP) have circulated ever since Debian Project announced it was sunsetting the popular and long-lived protocol on November 1 later this year. Don't believe it.
Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.
People go to work to do their job. They have meetings to attend, calls to make, tasks to complete, quotas to reach, and much more. So they can’t be bothered with worrying about information security. However, their habits – good and bad, innocent or malicious – are putting their employer’s business at risk. All it takes is one poorly made decision, or maybe even the lack of a decision in many cases, to damage or even destroy a business.
Modern enterprise is a perpetual tug-of-war between security and convenience. And the latter is winning. What’s an administrator to do?
With adoption of cloud applications on the rise, organizations need a plan for reducing the risk of shadow IT while allowing their organizations to enjoy the cloud's benefits.
Just when you thought it was safe to come to the office, your legacy systems have left you to fend for yourself. In this Experts Corner, expert Greg Hoffer explores the challenges associated with leaving legacy systems behind when moving to new business technologies.