Jul 7, 2016 | All Blogs, Business Continuity
Many IT organizations simply (or sometimes not so simply) feel like they are in the business of putting out fires. Every day it’s something new, something urgent, something unexpected – but “it’s always something.” The thought of actually having enough time,...
Jul 5, 2016 | All Blogs, Mobile, Security
Blog Series: IT Perspectives by Jaqui Lynch Mobile Devices For the past three days I have been in upgrade turmoil. There are two people in this house and between us we have three desktops, four laptops, two IPADs, two iPhones and2 iPods. All of these need upgrading at...
Jun 28, 2016 | All Blogs, Security
Contributor: Charles Kolodgy, Senior Security Strategist, IBM The term endpoint conveys a terminus — the end of the journey. However, for IT endpoints, be they computers, mobile devices, servers, point-of-sale terminals or a myriad of other devices belonging to the...
Jun 23, 2016 | All Blogs, Managed Services
Today’s technology is more complex than ever. Due to this complexity, less than 10% of companies report that their current IT infrastructure is fully prepared to meet the demands of mobile, social, big data and cloud. This trend is expected to persist and will...