Over 50% of security breaches are a result of end-user error, oversight, and ignorance. IT security training is an effective method of reducing end-user related security...
|
|
There are many factors that affect an organization's IT security training needs and goals: environment, specific security threats, and end-user perceptions and knowledge....
|
|
In order to create an effective IT security training program, you must make a series of key decisions based on information gathered during the Establishing Training...
|
|
A data center relocation can be best described as a controlled disaster that involves high risk and requires rigorous and thorough planning. Over 29% of IT professionals...
|
|
There are times when something critically important is being missed by not only the larger, non-specialist community involved, but even by those at the core of the...
|
|
A little jostling for market share is always a good thing, and the occasional sector blowup or segment technology revolution keeps everyone on their toes and healthy. But...
|
|
Many enterprises will elect to have Wireless LAN (WLAN) vendors perform an on-site demonstration to help them better understand solution capabilities and constraints. This...
|
|
The e-mail archiving market is a confusing mixture of storage vendors, compliance and e-discovery vendors, security vendors, and e-mail platform vendors. To complicate...
|
|
Publisher's Note: Our Asia Editor is in Stealth Mode, for reasons you are free to guess, and which we will neither deny nor confirm. Suffice it to say that he is happily...
|
|
A data center move has numerous one-time and ongoing expenses spanning a range of areas and project phases. It is important to develop an accurate budget up front so that...
|
|