Must-have Information for IT & IT Security Pros
A determined attacker can and will get in, so the security mechanisms you have in place to mitigate the damage will make the most difference.read more
Suppose that the C-level executives ask you to answer the following question: What is our risk from a phishing attack? How is a modern security professional supposed to answer?
In this video, learn about the emerging WebRTC technology, and how companies are using it to dramatically improve customer experience across the board.
Perimeter security is no longer sufficient for protecting sensitive or confidential data – especially in light of hackers’ demonstrated, repeated ability to breach network security.
There is one area where people think it’s great to mix personal and business, namely email clients. In fact, the Gmail Android app will allow for full Exchange support. If you ask Aberdeen’s Jim Rapoza, this could be a terrible idea.
TechPro is happy to present an exclusive, new chapter excerpt from a frequent contributor to Aberdeen Essentials, Dr. Terry Critchley.
Critchley’s new book is entitled High-Performance IT Services.
As this Stat of the Week shows, the price for one hour of dowtime has skyrocketed 60% since the last time we reported these costs…and that was just a year ago!