Tips
Tips
-
Is your SaaS system in line with SOX compliance requirements?
A SaaS vendor can provide many benefits, but adhering to SOX compliance requirements remains a concern. Here’s help to stay compliant when using Software as a Service. Continue Reading
-
How CIOs can avoid big chaos through a BI data steward
With big data comes big responsibility. CIOs can avoid big chaos during an ERP integration with the help of a data steward. Continue Reading
-
Agile project management helps overcome IT obstacles
Traditional project management can ruin the best-intentioned IT efforts. It's time to get flexible and interact with stakeholders using Agile methods. Continue Reading
-
How protecting against the OWASP Top 10 helps prevent compliance risk
Mapping security processes to protect against the OWASP Top 10 could ease Web application vulnerabilities and help some companies stay compliant. Continue Reading
-
How adopting an ITIL framework can lead to cost savings for business
An ITIL framework isn't easy, but it can drive huge cost savings. Learn how ITIL cost reduction strategies translate back to your business. Continue Reading
-
How GRC, sustainability and CSR relate to one another
How your organization determines the relationships among GRC, sustainability and CSR depends on the context of each item -- and is dependent on management's goals. Continue Reading
-
Seven categories for evaluating mobile device management products
Do you need a mobile device management product to control an employee-driven revolt against corporate-issued devices? Consider these MDM selection tips. Continue Reading
-
Private cloud computing is more than a virtualized environment
Private cloud computing will take hold in 2011, experts say, as enterprises move beyond a virtualized environment to such cloud attributes as metered use and chargeback. Continue Reading
-
Must-have ITSM tool features
When looking for an ITSM tool, audit the capabilities of the tool sets you have in place, and follow this check list of must-have features. Continue Reading
-
AML compliance and money service businesses
Money service businesses are a growing part of the financial services industry but compliance with anti-money regulations is critical. Continue Reading
-
Storage area network fundamentals: The right questions to ask
Will a storage area network be a good fit in your IT environment? Consult our guide to storage area network fundamentals, including how to evaluate your current setup and needs. Continue Reading
-
Don't skip ITIL Service Design: Questions, checklists to get started
ITIL Service Design sits between strategy and implementation -- and is often skipped by midmarket companies. Learn which questions and checklists can keep Service Design simple. Continue Reading
-
How to decide if changing technology vendors is worth the time, risk
The cost savings offered by a second-tier vendor may or may not be worth the risk and expense of migration. Here's how to decide when to make a switch. Continue Reading
-
Threat management for information systems relies on categorization
Every information system faces threats, but not all threats should be treated equally. ISO 27005 offers a guide on how to categorize threats to your organization. Continue Reading
-
HIPAA-covered entities' first step should be a quality assurance plan
HIPAA-covered entities must leverage or install a good QA team, an effort that should be driven from the top down and be part of the strategic plan of the technology organization. Continue Reading
-
10 must-have steps for an effective SMB information security program
No information security program would be complete without these security tips from the NIST, which has compiled advice just as security threats to smaller businesses are on the rise. Continue Reading
-
Even with a PPM solution, IT project and portfolio challenges remain
A PPM solution can help you allocate resources among IT projects and calculate ROI, but it's no panacea for organizational issues. Here's why. Continue Reading
-
How AML compliance applies to remote deposit capture
Financial institutions rushing to deploy remote deposit capture (RDC) need to consider how the Bank Secrecy Act and anti-money laundering regulations apply to the technology. In this tip, Dan Fisher explains what measures institutions need to take ... Continue Reading
-
Why it may not be ideal for your lawyer to be your compliance officer
While lawyers bring a certain expertise to the table, business leaders need a broader range of technical, security and communications skills in their compliance officers. Continue Reading
-
Cost reduction tips for your strategic sourcing contracts
CIOs should revisit their strategic sourcing contracts and work closely with their suppliers to analyze current spending and achieve maximum cost reductions. Continue Reading
-
How to perform a cost/benefit analysis: Build a model, not a number
CIO Niel Nickolaisen recommends doing a cost/benefit analysis based on building a working model, not numbers. Continue Reading
-
Database security: Who should have access?
The only users who should be allowed full access to any data store should be your system administrators. What about everybody else? Continue Reading
-
Computer recycling: Dangers for even the well intentioned
Recycling computers involves more than just passing them off to another company for cleaning. Due diligence requires CIOs to go even further to make sure data is eradicated. Continue Reading
-
Software license agreements: Scope is key
Been through a usage audit lately? Here are some license terms to watch for so you'll be on the up and up. Continue Reading
-
Data warehouses: Tips for building a disaster recovery plan
Data warehouses are more mission critical now. Read these tips to find out how to build them into a disaster recovery plan. Continue Reading
-
Laptop security best practices
Laptops can free employees to work remotely, allowing them to telecommute and travel easily. But that freedom comes with security perils. Continue Reading