IT Focus Area: Most Popular Articles
December 1, 2015
The 12 Most Popular Articles in 2015
From encryption to vulnerability assessments and insider threats, security weighed heavily on our readers’ minds in 2015. As more IT organizations move to the cloud, topics such as configuration management, data center colocation, application optimization and cloud deployment also made the list.
Cyber attacks take advantage of basic, often unnoticed security vulnerabilities. Poor patch management, weak passwords, and the lack of robust security policies are easy targets. An effective vulnerability assessment a critical first step in the effort to protect data.
This nine-step plan can help create an actionable strategy implementing a configuration management system so that your IT organization will be in a position to add value and enhance your organization's management capabilities.
These days a security breach is inevitable. The loss of sensitive data and other forms of enterprise information can lead to significant financial losses and reputational damage. Learn why data loss prevention is essential.
With careful planning and equal investments in people, process and technology, you can navigate the variety of enterprise encryption options at your disposal and stay ahead of threats while reducing complexity and compliance costs.
It is critical to select a colocation provider that is your partner, not just a facility. Learn how to find a provider who can help you meet your business goals and scale your IT over time.
Partnering with a colocation provider can offer greater agility, security, reliability; reduced capital expenditures and operational expenditures; and the ability to quickly scale. Learn the data center trends that can impact your partnership decision.
Businesses can optimize application performance by developing strategies for the rationalization, placement, transport, consumption and security of the applications they support. Explore how your organization can become application centric.
Challenges will always accompany transformational shifts in data storage, but with an accurate roadmap and the right tools, organizations can navigate even the rockiest terrain.
Cloud deployments are a challenge for any organization, especially if you’re operating under false impressions or classic cloud myths. Read on as we debunk the top 12 myths.
In today’s cyber-security landscape, it’s no longer enough to look outwards; in order to effectively address insider threats, security teams should also look inwards. Learn why a comprehensive insider threat strategy is essential.
As threats evolve, so must our actions to protect company and employee data. Here are 10 quotes featured in FOCUS Magazine online that provide some perspective on the current state of IT security.
As competitive pressures push IT organizations to “do more with less,” the disproportional investment in people and processes that are expected to support new or changed technologies often increases IT-related risks in the organization. Learn why your organizational structure may need changes.
To receive our most popular articles in your inbox every month, subscribe to our monthly round-up e-newsletter today.