No doubt, this is a hard question, Joel. You make great points - master the basics, get employees on board and launch bold initiatives. I can see traces of advantages in your suggestions, but as pre-requisites for good security. But how does security give you clear advantage in your market? Can it? Maybe not.
The House has passed an amendment to a larger bill that will streamline federal IT and finally empower CIOs - those able to keep their jobs as CIOs. Federal CIOs have long felt powerless and this bill, as this fedscoop story says, only restates their duties.
If passsed, the amendment, according to the story, would call for seriously denting the ranks of an estimated 250 federal CIOs. But with government, mandating and doing are two different things.
You raise some great points, but the public cloud ship has sailed. Companies have woven the public cloud into their business models. Some companies IT is solely the public cloud. So I think the idea that PRISM will kill the public cloud is not valid...at least until there's some incident, botched government snooping or compromised data. I also point out that the U.S. government (not sure about Canada where you reside) can come after your data no matter where it is. The public cloud might make it easier to snoop without the data's owner knowing it, though.
Last day of the month and it’s time for me to wrap up our deep-dive into imaging and printing security. Today I complete the series with a discussion on how to preserve integrity of print data and printed documents. If you missed the any of the rest of the series you can catch up and review the first four articles to give you a complete understanding of all the elements of print security along with strategies and solutions to secure your own print environment.
If you’re just catching up, you’ll want to review the first 4 articles:
If you’ve been following my series on how to lay a foundation for a secure print environment, you now understand that there is more to print security than most people realize. By the end of this series, you will understand all the elements of print security along with strategies and solutions to secure your own print environment.
This week I continue with part 4 in the series, taking a deep dive into maintaining compliance. If you’re just catching up, you’ll want to review the first 3 articles:
Last week I kicked off a series of articles on secure printing starting with “Laying a Foundation for Secure Printing.” This week we continue the secure printing discussion with a focus on risks and solutions for addressing privacy concerns within an enterprise print environment.
Consider this scenario: Patient confidentiality - A prominent medical center
Welcome to 2012! If you’re contemplating IT resolutions for the New Year, shoring up your overall security plan would be a wise choice. Information is one of an organization’s most valuable assets, from proprietary intellectual property to confidential customer details. News headlines frequently highlight sensitive information breaches, either by groups such as Anonymous and WikiLeaks, or through employee mistakes or oversights.
It's mid-December, nearly year-end, and I'm in clean-up mode. I'm working to get organized and prepared to take some much needed time off while simultaneously preparing for returning to work after the holidays -- hopefully without missing a beat. End of year is the perfect time to take a step back and review the processes and operations that keep your organization running smoothly too. What needs to be "cleaned-up" for the new year? A likely candidate is managing the older IT assets your organization no longer needs.