Despite the increased number of regulations and a judicial system that is becoming more IT savvy, more than half of 2,000 worldwide organizations surveyed by Applied Research on behalf of Symantec are not prepared to cope with any sort of legal request for access to certain documents.
At the same time, courts around the world are not accepting pleas of undue burden based on the fact that documents are too hard to find, which means the weight of complying with any legal request is now squarely on the shoulders of the IT department.
Seven Ways to Identify a Secure IT Environment A security checklist for IT pros.
The Secret Rules of Business Success (or Failure) Rules that define the differences between a company that is doing well and one that is failing.
Seven Tips to Attain Purpose and Happiness in Life and WorkIt may simply be a question of "when" not "if" a range of mobile computing devices displaces the PC.
The perimeter of the network is no longer the only concern; it is the endpoints and applications that are putting IT organizations on high alert. ... More >>
Here are some tips and tricks to ensure you're ready to start the fall with an effective strategy for monitoring threats and endpoint vulnerabilities. ... More >>
Antivirus software is no longer a match for today's threats. Here's what your business needs to stay protected. ... More >>