Just Delete It – Destruction as an IT Security Strategy
If confidential information didn’t exist, you wouldn’t have to worry about data breaches.
If confidential information didn’t exist, you wouldn’t have to worry about data breaches.
IT strategy – hmm, that sounds good! It suggests you know what you’re doing, and that those invoices from your IT suppliers correspond to something of value to the business.
IT servers, enterprise applications, data centres and cloud services might seem world away from other sectors traditionally attracting attention in terms of a ethical sourcing strategy.
Now and again, we hear rumblings about IT governance and how synergy must be developed between IT and the rest of the organisation to work in harmony as a “business partner”. The principles are praiseworthy.
According to some sources, only 10% of any business strategy plans are ever effectively implemented.
On the face of it, it sounds simple. IT strategy should be driven by business requirements.
As IT morphs from legacy on-site systems and firewalls to cloud computing, mobility and data-anywhere, it is having to change in terms of agility and security.
‘I keep it all in my head’. Or ‘How likely is it that an event occurs that stops my business from operating?’ These are frequently the reactions of small business owners to the idea they should pay more attention to business continuity and disaster recovery. While business continuity often occupies an increasingly large part of…
Good business continuity continues to be both a learning and a problem-solving process. While the Business Continuity Management industry has its own experts who work on the problems and solutions on a daily basis, continuing to be open-minded about input from outside the industry can also be rewarding. For OpsCentre, our participation in the University…