No Doubt, IBM Insight Will Be Exciting Underneath It All

Please forgive me if I’m a little extra excited about IBM Insight next week. Last year when I attended IBM Information on Demand (IOD) 2013, the predecessor to this year’s re-christened IBM Insight, IBM had just named us a Global Training Provider after the company decided to turn the reigns of its training over to outside companies. IBM IOD was the first IBM conference I attended after that announcement. I soon found IBMers are very social media savvy. I thought only Cisco Live! and VMworld attendees were that active. I had found my people!

Read more

Top 5 Common Activities that Break Company Security Policy

Many employees are not as well-versed in their company’s security policy as they should be. This may result in workers performing tasks that might seem innocent or benign on the surface, but which actually put the organization at risk of a security breach. Understanding what you are doing (as an employee) or what your users are doing (as a boss or manager), can help you work toward a viable resolution to these situations. In most cases, user behavior changes as well as implementation of new technological solutions can curb exposure to risk and increase security policy compliance.

Read more