Tips
Tips
-
HIPAA-covered entities' first step should be a quality assurance plan
HIPAA-covered entities must leverage or install a good QA team, an effort that should be driven from the top down and be part of the strategic plan of the technology organization. Continue Reading
-
10 must-have steps for an effective SMB information security program
No information security program would be complete without these security tips from the NIST, which has compiled advice just as security threats to smaller businesses are on the rise. Continue Reading
-
Even with a PPM solution, IT project and portfolio challenges remain
A PPM solution can help you allocate resources among IT projects and calculate ROI, but it's no panacea for organizational issues. Here's why. Continue Reading
-
How AML compliance applies to remote deposit capture
Financial institutions rushing to deploy remote deposit capture (RDC) need to consider how the Bank Secrecy Act and anti-money laundering regulations apply to the technology. In this tip, Dan Fisher explains what measures institutions need to take ... Continue Reading
-
Why it may not be ideal for your lawyer to be your compliance officer
While lawyers bring a certain expertise to the table, business leaders need a broader range of technical, security and communications skills in their compliance officers. Continue Reading
-
Cost reduction tips for your strategic sourcing contracts
CIOs should revisit their strategic sourcing contracts and work closely with their suppliers to analyze current spending and achieve maximum cost reductions. Continue Reading
-
How to perform a cost/benefit analysis: Build a model, not a number
CIO Niel Nickolaisen recommends doing a cost/benefit analysis based on building a working model, not numbers. Continue Reading
-
Database security: Who should have access?
The only users who should be allowed full access to any data store should be your system administrators. What about everybody else? Continue Reading
-
Computer recycling: Dangers for even the well intentioned
Recycling computers involves more than just passing them off to another company for cleaning. Due diligence requires CIOs to go even further to make sure data is eradicated. Continue Reading
-
Software license agreements: Scope is key
Been through a usage audit lately? Here are some license terms to watch for so you'll be on the up and up. Continue Reading
-
Data warehouses: Tips for building a disaster recovery plan
Data warehouses are more mission critical now. Read these tips to find out how to build them into a disaster recovery plan. Continue Reading
-
Laptop security best practices
Laptops can free employees to work remotely, allowing them to telecommute and travel easily. But that freedom comes with security perils. Continue Reading