Guest Posts Archive
This is a guest article written by François Amigorena. The author’s views are entirely her own and may not reflect the views of IT Governance. A recent report by Dark Reading uncovered that millions of stolen and fake student, faculty, …
This is a guest article written by Autumn Haile. The author’s views are entirely her own and may not reflect the views of IT Governance. IT managers have a lot of day-to-day functions that help keep their network operating at an …
This is a guest article written by David Balaban. The author’s views are entirely his own and may not reflect the views of IT Governance. The health/medical and business sectors top the Identity Theft Resource Center (ITRC) Breach List. The health/medical …
This is a guest article written by Ralph Goodman. The author’s views are entirely his own and may not reflect the views of IT Governance. When it comes to network security, many businesses do not consider the physical security risks. Your …
This is a guest article written by Daphne Stanford. The author’s views are entirely her own and may not reflect the views of IT Governance. There are a number of keys to ensuring data security. Data breaches are some of the most preventable setbacks a …
Billions of dollars are thrown away annually through phony tax returns. It's a cyber crime that is continuously growing. Actually, it’s not difficult for a criminal to swipe your tax refund. Here’s what the story of a victim of tax …
The culture of an organization defines how it works. The team’s attitudes and behaviors are critical components of the culture, and they define how the work is completed. With any ITSM-related initiative, how work is completed will change. To be …
This week we have a guest blog post from Pwnie Express Marketing Analyst, Sara Kantor. Although it’s easy to think of cybersecurity as the realm of financial data and credit cards, one of the most susceptible areas of recent technological …