
Sign up to save your podcasts
Or
Let’s face it: it is becoming harder and harder to keep the company’s IT assets and its network safe from people who want to do you harm.
The threats are relentless and they just keep getting stronger and coming at us from all directions. Additionally, what could happen if the bad guys do get in can now be disastrous because of the importance of information technology when you consider how much customer data can be lost, how many corporate secrets can be lost, and then the threat of lawsuits because of the breech.
As CIOs we probably should not be sleeping very well at night and here are the reasons why.
Let’s face it: it is becoming harder and harder to keep the company’s IT assets and its network safe from people who want to do you harm.
The threats are relentless and they just keep getting stronger and coming at us from all directions. Additionally, what could happen if the bad guys do get in can now be disastrous because of the importance of information technology when you consider how much customer data can be lost, how many corporate secrets can be lost, and then the threat of lawsuits because of the breech.
As CIOs we probably should not be sleeping very well at night and here are the reasons why.