The past few years has seen a radical change in how IT departments and employees think about end user computing. In the past, IT departments created a standard desktop image for corporate applications ...
I was first introduced to the limitations of ‘end user’ thinking a decade ago when I managed the rollout of an oil & gas exploration toolset. I expected clear processes and defined user roles. Instead ...
It always takes two for a phishing attack to work – an attacker to send the bait and an insider to take it. Almost every organization carries out some form of security and awareness training (SAT) to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results