Jeff Jinnett: Value of an IT Security Due Diligence Document/Risk Mitigation Plan

If a company were ever asked to describe its IT security program, the company likely would have to bring in numerous staffers from the IT department and refer to reams of documents to present a full picture of the company’s IT security approach.  The need to be able to describe the company’s IT security program…

0

Jeff Jinnett: The Problem with Unmanaged End User Computing Applications

Approximately 68% of an enterprise’s corporate data is managed in IT Department-controlled applications and 32% is stored in key Microsoft Excel spreadsheets(1), Microsoft Access and other databases(2) , business intelligence tools (e.g., reporting tools), Microsoft Word and other forms of documents, web-oriented architecture “mashup” approaches(3) and other end user computing applications. Often the 32% portion…

0