Babylon Health Admits ‘Software Error’ Led to Patient Data Breach

While preventing security attacks and data exposure is a priority for an organization, having a plan for what to do if the attack or leak does happen is just as important.

By |2020-06-11T10:00:26-04:00June 11th, 2020|IAITAM News You Can Use|0 Comments

Organizations Flooded With New Tech Purchased For Work-From-Home Employees Face Unique “Asset Refresh” Opportunity

IT Asset Management (ITAM) Strategies Can Turn Excess Hardware Hurriedly Snapped Up During the Pandemic By Companies, Agencies Into Cost-Saving Resources

By |2020-11-23T17:52:27-05:00June 9th, 2020|News|0 Comments

Stolen Cell Phone Tracked to Bike Thief

Every organization should form a lost and theft policy and procedure for their IT assets. When circumstances like loss or theft happen, there are a few things an IT Asset Manager can do, like helping to set up a system to be able to remotely wipe the data off of the device.

By |2020-06-04T10:58:49-04:00June 4th, 2020|IAITAM News You Can Use|0 Comments

Go to Top