The hidden costs of your helpdesk

When an employee experiences a lockout, frustration rises while productivity drops. This downtime interrupts individual workflow as well as IT agent efficiency. Then there are the potential security vulnerabilities that go hand-in-hand with frequent lockouts, password resets, and re-verifications. All of these delays and interruptions can lead to lost revenue. Where do these costs come…

Can you have too many security tools?

A member of your organization’s security team reads about a new kind of security tool and brings it to the CISO’s attention, who decides that it’s a good investment. The CISO sees a new kind of security threat that requires a different security tool. A colleague recommends a security tool she says is indispensable. Before…

What tech Infrastructure NSW’s ICT director aligns with business objectives

“It’s important to ensure the technology function isn’t just a set of blinking lights and widgets,” says Sean Carritt, director for ICT and business systems at Infrastructure NSW, the government agency of New South Wales that identifies and prioritizes public infrastructure for economic and social benefit. “Delivering technology that’s well aligned to the business’ overall…

Las empresas priorizarán de forma “crítica” la copia de seguridad de aplicaciones SaaS

El riesgo ante posibles interrupciones de TI pone de relieve la necesidad de realizar copias de seguridad y recuperaciones periódicas de datos empresariales críticos. Así, según vaticina la firma de análisis e investigación Gartner, con vistas al próximo 2028 el 75% de las compañías priorizarán la copia de seguridad de aplicaciones de Software como Servicio…