shadow IT

The Reports of FTP Death are Greatly Exaggerated

Reports of the death of File Transfer Protocol (FTP) have circulated ever since Debian Project announced it was sunsetting the popular and long-lived protocol on November 1 later this year. Don't believe it.

Seriously?! Can You Not Do That? Chapter III - External Internet Access

Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.

Seriously?! Can You Not Do That? | Chapter I - Bad Habits and InfoSec Apathy

People go to work to do their job. They have meetings to attend, calls to make, tasks to complete, quotas to reach, and much more. So they can’t be bothered with worrying about information security. However, their habits – good and bad, innocent or malicious – are putting their employer’s business at risk. All it takes is one poorly made decision, or maybe even the lack of a decision in many cases, to damage or even destroy a business.

The Perpetual Tug-of-War Between Security and Convenience. What to Do?

Modern enterprise is a perpetual tug-of-war between security and convenience. And the latter is winning. What’s an administrator to do?

Shadow IT & Clouds. Let’s Minimize Risks & Enjoy the Benefits

With adoption of cloud applications on the rise, organizations need a plan for reducing the risk of shadow IT while allowing their organizations to enjoy the cloud's benefits.

Legacy Tech: Someone or Something Might Be Lurking in The Shadow

Just when you thought it was safe to come to the office, your legacy systems have left you to fend for yourself. In this Experts Corner, expert Greg Hoffer explores the challenges associated with leaving legacy systems behind when moving to new business technologies.