Posts By Author: Brett Hodgson



Security

Embracing ‘rogue’ technology

November 16th, 2010

As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?

Continue reading...