Remember the corporate accounting scandals that took out Enron, Arthur Andersen and WorldCom? They all ended with prison sentences, layoffs, and billions of investor dollars lost forever.
For 95 percent of enterprises, one hour of downtime costs $100,000 or more in SLA penalties according to data from ITIC.
Many health care IT organizations create service-level agreements (SLAs) for new applications and infrastructure projects. It's important to collect metrics related to SLA line items and review your metrics on a regular basis.
Some things happen to a healthcare CIO that just don't happen to IT execs outside of the healthcare industry. On some days, you walk down the hospital corridors beaming, thinking of how your work directly improves human health and quality of life. On other days, you'd...
In addition to training for core skills and emerging technologies, IT teams need training to combat evolving security threats.
When disposing of electronic equipment, IT has to think not only about environmentally friendly disposal but also compliance concerns. For example, HIPAA regulations, as explained by HealthITSecurity, require entities that handle personal health information (PHI) to...
The Yahoo data breach, first reported in August 2016, has exposed personal information from as many as 500 million Yahoo accounts. The attack, according to USA Today, most likely happened in 2014, and it's thought to be the largest single data breach in history.
It's undeniable: the way IT fits into business operations is changing. Proving the value of information technology teams as business partners could be the difference between the outsourcing of services and outsourcing of, frankly, everyone.
When it comes to which server operating system is better, you know the score: Redhat for security, Windows Server for easier all-around operation.
Researchers from the Florida Institute for Cybersecurity Research (FICS) have developed a solution to prevent ransomware by stopping encryption early, giving victims less incentive to pay off their attackers. Instead of using continuous file monitoring, which can...