Big Jump Predicted in Use of eDiscovery

Among more than 650 IT professionals surveyed in a CompTIA survey, E-Discovery Trends and Practices, 53 percent expect the use of ediscovery within their organizations to increase over the next few years. However, many firms routinely engage in data collection and informal investigations related to personnel matters, violations of company policies and security breaches that…

The Outsourcing Continuum, Part V: Application Outsourcing

In addition to the infrastructure outsourcing we’ve been discussing in this series, there is now opportunity to outsource selected applications that are important to the company but not strategic. Let’s consider all the business functions that are common to many businesses, for example, your email server. Modern business relies on email to do business every…

Understanding the Threat of Insider Misuse

Insider misuse is not necessarily malicious behavior. Individuals misusing the organization’s computing resources are for the most part not doing so with the intent to harm the organization. They may just be attempting to “get the job done.” For example, an employee may use his personal laptop to bring work home over the weekend in…

‘A Lizard Crawled Into My Server’

“How do I get my computer’s coffee-cup holder to come out again?” That may sound like a baffling request, but for seasoned help desk professionals, it’s not out of the ordinary. In a new survey, CIOs identified the most unusual requests they or their support staff have fielded. The survey shows that it takes more…