Home|IAITAM News You Can Use

Keeping you Updated at the Speed of Technology

Windows File Recovery is Windows’ New Tool for Finding Lost Files

Great for end users, but is one more hurdle for ITAM and disposal efforts. However, leveraging this built in tool could help IT Asset Managers ensure that when a data wipe is completed prior to disposal (you are doing that, right?) it is not easily retrievable. Remember, even Microsoft says that deleted files are marked

By |2020-07-01T16:33:49-04:00July 1st, 2020|IAITAM News You Can Use|0 Comments

Why Donating IT Assets to Charity Might Bring Your Organization the Most Value

There are many benefits to donating assets which include enhancing your community and becoming a pillar of societal welfare to those around you. Learn in this article how to donate to charities safely, ethically, and in a way that everyone benefits!

By |2020-07-01T09:57:39-04:00July 1st, 2020|Featured Articles, IAITAM News You Can Use|0 Comments

Cloud computing vs. edge computing

One of the hardest parts of IT asset acquisition is knowing which asset will best suit the organization. There are many options out there, and even though some may seem to work well with other organizations, it might not work best with yours. The best way to know what would work best is to research

By |2020-06-26T14:24:20-04:00June 26th, 2020|IAITAM News You Can Use|0 Comments

Worst Data Theft in CIA History Could Have Been Avoided

While ITAM does not directly deal with IT security practices, it supports the processes. Helping to protect data is what ITAM focuses on, and a major way to help is to meet with the IT team and figure out security processes and policies.

By |2020-06-18T11:12:06-04:00June 18th, 2020|IAITAM News You Can Use|0 Comments

South African Bank To Replace 12 Million Cards After Employees Stole Master Key

While organizations cannot always determine how employees are going to act, they can narrow down the chances of internal data leaks by limiting who has access to what data. Employees only need access to data that directly affects their responsibilities.

By |2020-06-16T10:48:24-04:00June 16th, 2020|IAITAM News You Can Use|0 Comments

Babylon Health Admits ‘Software Error’ Led to Patient Data Breach

While preventing security attacks and data exposure is a priority for an organization, having a plan for what to do if the attack or leak does happen is just as important.

By |2020-06-11T10:00:26-04:00June 11th, 2020|IAITAM News You Can Use|0 Comments

Stolen Cell Phone Tracked to Bike Thief

Every organization should form a lost and theft policy and procedure for their IT assets. When circumstances like loss or theft happen, there are a few things an IT Asset Manager can do, like helping to set up a system to be able to remotely wipe the data off of the device.

By |2020-06-04T10:58:49-04:00June 4th, 2020|IAITAM News You Can Use|0 Comments
Load More Posts