Network admin fined $1.5 million for doing his job?
A network administrator accused of sabotaging his employer’s computer system has already been sentenced to prison time — now he’s being ordered to pay a huge fine as well. His crime? According to him,...
View ArticleStudy busts myths about password policies
Most companies have some sort of password creation policy in place to keep users from choosing simple codes such as “12345″ or “password” to protect sensitive company documents. But not all of those...
View ArticleShould worker fired for web use get unemployment?
Taking disciplinary action against an employee for improperly using the Internet at work can bring up some legal questions for companies. Among them: Is wasting time online considered enough of an...
View ArticleUsers bring their own mobile devices no matter what IT says
Many companies have started coming up with policies regulating employees’ use of personal gadgets for work purposes. But whether there’s a policy or not, employees are using their personal devices. In...
View ArticleCould boss read employee’s personal email?
IT must often walk a fine line between protecting employees’ privacy and enforcing IT policies and procedures. Being on the wrong side of the line can get organizations into legal trouble. In one...
View Article5 ways to make users care more about security
No surprise here, but a recent survey shows just how little many employees care about IT security while they’re at work. How can IT managers get them to change their attitudes? The good news: It’s...
View Article5 policy mistakes that sink BYOD programs
A BYOD policy is becoming a requirement for most companies – unfortunately, for many organizations, creating an effective policy involves a lot of trial and error. Most experts agree that having a...
View ArticleStudy: 91% of all accounts use one of the 1,000 least secure passwords
Password security requires a delicate balance. Many policies require complex codes, but if IT goes too far, users will end up breaking the rules when they can or keep their passwords written on paper....
View Article3 hidden costs of BYOD – and what to do about them
When deciding on a mobile strategy, here are three hidden costs of BYOD companies need to consider. We recently discussed some of the alternatives to BYOD that companies can use to improve user...
View ArticleBYOD policy keys to avoid legal trouble
As more employees use their personal computing devices at work, companies have to ask some questions about their rights to manage a gadget that someone else owns. While many of BYOD’s complex legal...
View ArticleWhile IT sweats BYOD policies, users reject them
Two recent reports show that neither users nor IT are particularly comfortable with BYOD as it stands today. And while IT is working to refine these policies, users are likely to ignore them....
View ArticleSample data transfer and storage policy template
Storing and transferring data has never been easier for workers – or more dangerous. Here is a sample policy you can build off of in order to set rules and best practices for how users can transfer...
View ArticleSample BYOD policy template
Bring your own device (BYOD) programs call for three critical components: a software application for managing the devices connecting to the network, a written policy outlining the responsibilities of...
View ArticleCreating an acceptable use policy that’ll be followed and enforceable
You can’t police everything users do on company machines, nor should you try to. But in absence of a Big Brother policy where IT is always watching, you can help users understand what inappropriate...
View Article
More Pages to Explore .....