Refresh Stories


 

Top 10 Most Read Stories

What subscribers chose to read over the last 30 days

 
1. 5 Dangerous File Sharing Habits You Need to Break Right Now
Sharing files with colleagues and clients should be easy and convenient. What it shouldn't be is a security risk — but it frequently is. Because many small businesses don't have the right file-sharing systems and policies, many turn to unsafe practices that often put both their business's and clients' privacy in jeopardy.
Origional Story Date :2/14/2020
News | Business News Daily
Information Technology | Security | Data Security
2. Your phone talks about you behind your back. These researchers are listening in
Data trackers are everywhere on apps. Researchers want to know what info they're passing along. When you download an app, the permissions requests and privacy policy are usually the only warnings you'll get about the data it's taking. Usually, you just have to take the app's word that it's grabbing only the data you've agreed to give it.
Origional Story Date :2/13/2020
HowTo | CNET News
Information Technology | Hardware | Mobile Devices
3. Zuckerberg: Facebook content should be regulated, but under a new model
Facebook CEO Mark Zuckerberg speaks Saturday at the Munich Security Conference. Tobias Hase/picture alliance via Getty Images) Facebook CEO Mark Zuckerberg agrees that his company should be regulated when it comes to harmful content on its social networks.
Origional Story Date :2/17/2020
HowTo | CNET News
Information Technology | Online | Social Networking
4. How blockchain could help block fake news
Creating an immutable ledger to track metadata associated with published content shows promise as a method for identifying authentic news. As part of a Web 3.0 evolution, blockchain is being used to create a decentralized web, where an immutable ledger records information about content and then is inextricably linked back to that content to ensure its authenticity. Personal data stores would also allow companies and individuals to retain control over content they make or consume.
Origional Story Date :2/17/2020
News | Computerworld
Information Technology | Security | Blockchain
5. The Human Elements of Cybersecurity: Privacy, Ethics, Usability, and Responsibility
Information security professionals often interpret the human component of IT as “human fallibility,” the weakest link in a company’s data security apparatus. You can’t blame them. In many cases, cybersecurity incidents are enabled by human error, malicious intent, or ignorance.
Origional Story Date :2/18/2020
HowTo | Business 2 Community
Information Technology | Security | Cybersecurity
6. How to set healthy boundaries at work to avoid burnout
Burnout is real. You don't have to set fire to your phone, though. There's no doubt about it -- Americans today spend too much time working. More and more studies show that our over-dedication to our jobs is actually hurting our work performance and our health.
Origional Story Date :2/17/2020
HowTo | CNET News
Human Resources | Operations | Personnel | Wellness
7. How to Encourage Employee Engagement Through Learning and Development?
Employee engagement has become critical for business success. The failure to engage employees results in endangering the productivity and growth of the organization. Employee engagement is a complex strategic process and ‘Learning and Development’ (L&D) is part of it. According to a survey, it was found that around 85% of employees across the world are disengaged. This means that they are not performing the best of their abilities despite showing up in the office and filling up the hours of the clock.
Origional Story Date :2/11/2020
News | Business 2 Community
Human Resources | Morale | Engagement
8. Business Intelligence Doesn't Need More AI; It Needs More Humans
On New Year’s Eve 2019 at 10:00 AM EST, an artificial intelligence algorithm sent a warning out to medical professionals around the globe about a severe respiratory infection affecting Wuhan, China. In addition to identifying the source of the outbreak, it then used global airline ticketing data to correctly predict that the virus would likely spread to Seoul, Bangkok, Taipei, and Tokyo.
Origional Story Date :2/10/2020
News | Business 2 Community
Information Technology | Software | Business | Business Intelligence
9. What is data governance? A best practices framework for managing data assets
Data governance defines roles, responsibilities, and processes for ensuring accountability for and ownership of data assets across the enterprise. Data governance is a system for defining who within an organization has authority and control over data assets and how those data assets may be used. It encompasses the people, processes, and technologies required to manage and protect data assets.
Origional Story Date :2/11/2020
News | CIO Magazine
Information Technology | Services | Data Management
10. The tech IT professionals love: 5G, cloud management, Graph API
There’s plenty of technology to be excited about, but the IT pros we talked with say 5G, cloud management tools and Graph API tools are the technologies they love. They shared their thoughts in a recent IDG TECH(talk) Twitter chat. Looking at the enterprise technology landscape, three areas have industry experts and watchers excited: 5G, cloud management and Graph API.
Origional Story Date :2/13/2020
News | Computerworld
Information Technology | Software | Software Development