6 Sharepoint Security Do’s and Don’ts … or

Microsoft SharePoint server is a widely implemented information portal. One of the main drivers of its success is that it is largely free. In a typical enterprise, there might be any number of authorized SharePoint servers to which almost everyone has access, plus a few that simply spring up and start growing for specific projects….

How to Keep Track of Employees Social Media Usage

To say that confusion reigns over who is responsible for something said in social media is the understatement of the year. In a sad but comedic squabble over individual vs. corporate responsibility, a flurry of finger-pointing ensues only to end in a rash command to the rank and file to just “zip it already”. But…

Top 10 Myths of Safe Web Browsing

A sense is growing that defenses have gotten stiffer and bad guys are too busy phishing for suckers on Twitter, so what’s the worry? Here it is in boldface, according to Steve Santorelli, a onetime Scotland Yard cybercrime specialist now working for security research firm Team Cymru. “It gets more dangerous for enterprise IT online…

The Security vs. Access Paradox

There is only one foolproof way to protect your networked computer systems against electronic snooping, hackers, unauthorized access, stolen passwords, denial-of-service attacks and other security breaches … unplug them. That clearly isn’t a practical solution. In fact, most companies these days are compelled to open their systems to people inside and outside their organizations in…

IT Execs Confront the Realities of the Cloud

Cloud computing is the buzz word du jour. Fortunately, it is backed up by substance and potential value to the enterprise. But going blindly into the cloud is not a good idea. That could lead to the adoption of insecure public cloud resources, bit-and-piece implementation and headaches up the road (and other things!). What is…

CIOs Predict Modest Increase in 4Q New Hires

CIOs at leading technology companies are planning to increase their headcount in the fourth quarter, but not at a rate that suggests the industry is anywhere near ready for bounds of prodigious proportions. According to a survey of executives by employment staffing and consulting services firm Robert Half International, tech companies will hire new employees…

Spies Among Us

A recent study produced by Verizon and the US Secret Service delivered a surprise finding: in last year’s electronics record breaches, nearly half were inside jobs, or, required insider cooperation. In the merged Verizon/Secret Service data set, 48 percent of breaches were attributed to users who maliciously abused their right to access corporate information. An…

Headaches Abound with Mobile-in-the-Cloud

While the cloud is taking the data center by storm few are noticing the thunderhead rolling in over mobile management. Perhaps since IT has successfully mastered mobile evolution to this point, it presumes “mobile-in-the-cloud” is just more of the same. To a degree, that presumption is understandable as the cloud does move smartphones closer to…

Smart Grid – Promises and Pitfalls for IT

There may be much ado about smart grids these days but the upshot is there’s a lot left to do. Certainly the federal government is backing the effort whole-hog and major players of the Utilities Telecom Council (UTC) and Verizon-ilk are burning the midnight oil to bring home that bacon. That’s not to say that…

Special Report – CompTIA’s Five Industry Trends to Watch in 2010

While some macro-economic indicators have shown signs of improvement in recent months, some big unknowns still loom: unemployment, the impact of public sector debt, and a tight lending and credit market to name just a few. Perhaps, the biggest fear among IT executives is the possibility of a stalled recovery; specifically, an environment of weak…