CIO Symmetry

April 17, 2015  8:20 PM

The value of a CIO-CMO union; IBM Watson brings personalization to healthcare

Brian Holak Brian Holak Profile: Brian Holak
BPM, BYOD, CIO, CMO, Data Analytics, Mobility

What’s the state of C-level relationships within your company? IT experts from Organic Valley and IBM explain how strong C-level bonds — especially that of the CIO-CMO — are proving vital to business success.

This week, IBM announced the launch of Watson Health, a business unit that will provide personalized care insights. In the latest Searchlight, Site Editor Fran Sales discusses what CIOs can take away from the announcement and touches upon evolving IT strategies in an increasingly analytics-driven and personalizable world. Plus, Yahoo might buy Foursquare and Google faces EU antitrust charges.

Mobile application development tools continue to proliferate, but choosing the right approach for your organization can be difficult. Executive Editor Linda Tucci talks to CIOs to get their expert take on mobile app development challenges and best practices.

Dealing with hybrid environments is challenging, but for CIOs, it has become a core competency that demands attention. IT professionals break down how to handle hybrid environments with new tools, more manpower and a deeper understanding of business data.

A new year, a new list of IT initiatives to tackle. TechTarget’s 2015 IT Priorities Survey asked 2,212 IT professionals their top projects, expectations and concerns for this year. Find out the results of the survey and see how they compare with your organization’s IT priorities in this Essential Guide.

Over on SearchCompliance, expert contributor Bryan Barringer offers advice on enterprise BYOD in a three-part webcast series. First, Barringer talks about overcoming BYOD legal issues; then he discusses BYOD best practices for mobility governance teams; and lastly, he discusses key mobility software and technologies.

In the latest installment of Startup Spotlight, Features Writer Kristen Lee visits startup URX to talk about deep linking — a process that would allow a user to move seamlessly from one app to another — and how their company thinks deep linking will improve mobile strategies.

Every company has a copy data problem, but it’s become something of a “hidden issue,” with the business side left in the dark by IT. In the most recent TotalCIO blog post, Lee discusses the copy data problem and how to manage it.

Finally, get caught up on the current state of business process management by checking out SearchCIO’s latest handbook on how BPM systems have changed in the digital age.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

April 10, 2015  6:53 PM

Informatica goes private; reasons to craft a bimodal IT strategy

Brian Holak Brian Holak Profile: Brian Holak
BPM, Data analysis, GRC management, IT, Mobile

It was announced this week that software company Informatica Corp. is going private. Is this a good move? Laskowski details the potential benefits and drawbacks of the decision, and what it could mean for CIOs.

Russian hackers may have used spear phishing to hack the White House yet again. In this week’s Searchlight, Site Editor Fran Sales breaks down the hack, our “clicking” problem and some approaches to social engineering threats.

Can CIOs have their cake and eat it too with bimodal IT? In her coverage of the Gartner Business Intelligence and Analytics Summit, Senior News Writer Nicole Laskowski explores Gartner analysts’ take on crafting a more nuanced IT strategy that focuses on both standardization and keeping the lights on.

Also from the Gartner summit: Renowned director and keynote speaker Francis Ford Coppola talked about the importance of gut instinct in a data-driven environment, relating his film creation process to the world of IT. Plus, MGM Resorts revealed their best practices for serving the digital customer.

Speaking of the digital customer, the need for businesses to digitize their processes to adapt to increasing IT consumerization has never been more urgent. Can BPM help with that? Executive Editor Linda Tucci talks to experts to get their take on leveraging BPM to help make the transition to a digital business.

In the latest issue CIO Decisions, learn about how the marriage of mobile and big data is evolving in today’s mobile culture, and discover what tools and applications are necessary to keep pace with this evolution. Plus, hear more about the mobile-data relationship in Tucci’s editor’s note.

Over on the IT Compliance Advisor blog, Sales runs down the latest GRC-related news, starting with new U.S. sanctions that take aim at foreign cyberattackers and Facebook’s mounting privacy battle with the European Union.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

April 3, 2015  5:58 PM

The rise of Apache Spark; signs your customer service strategy is broken

Brian Holak Brian Holak Profile: Brian Holak
Big Data, CIO, Internet of Things, iot, Social networking

Big data requires a big, effective data processing engine. According to Databricks, their new open source data processing engine, Apache Spark, is in a league of its own. In this week’s Data Mill, senior news writer Nicole Laskowski explores the technology and what separates it from MapReduce and other Hadoop offerings. Plus, Laskowski discusses whether Apache Spark is enterprise-ready in her latest TotalCIO blog post.

Is your customer service strategy broken? In the age of the customer, being able to provide an outstanding customer experience is more important than ever, according to consultant Rick Davidson. In this Conference Notebook column, read through Davidson’s six signs of a broken customer service strategy and learn how to get your strategy back on track.

IBM announced this week that it’s investing $3 billion in an Internet of Things business unit, underscoring the need for CIOs to start figuring out the potential benefits of IoT for their businesses. In this week’s Searchlight, site editor Fran Sales highlights the impacts of IBM’s announcement and discusses how to tackle IoT in your business through strategic partnerships. Also in Searchlight, Silicon Valley execs take a stand against controversial anti-LGBT laws; GitHub faces an unprecedented amount of denial-of-service attacks.

Enterprise social networking platforms are a great tool for employees to communicate and create, but launching one—especially a successful one—isn’t always easy. SearchCIO expert Bryan Barringer recounts the lessons he learned from FedEx’s social networking platform project.

Is it time to start thinking “digical?” Mobile expert Kelly Manthey says digital and physical interactions with customers can play off of each other to provide a better overall experience.

Also on the CIO Symmetry blog, get five IoT security tips from an IoT startup and learn more about how the CFO role in making IT decisions is growing in small businesses.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

March 31, 2015  7:00 PM

IoT security tips from an IoT startup

Kristen Lee Kristen Lee Profile: Kristen Lee

The benefits of IoT are just as well known as the risks that come with it. And, as happens with most new tech trends, CIOs are wary of jumping in at first, Tom Pincince, CEO of Digital Lumens, an intelligent LED lighting startup in Boston, said.

But Pincince hopes CIOs won’t be too wary because although there are risks, “the business benefit is so great that I think the balance between making [IoT] secure and making [IoT] useful [can] easily be reached,” he said.

Lean forward into IoT

Pincince advised CIOs to “lean forward into IoT” and think about how they would use data the IoT will inevitably bring to improve business operations.

As an IoT startup, Digital Lumens, Pincince, and the team, have already begun to discover what connected objects can do for businesses.

“One of the big things that we’ve been able to include in our product is this facility occupancy map,” said, Yolonda Smith, application engineer at Digital Lumens and formerly part of the United States Air Force with a background in cyber security and cyber defense. The occupancy map takes data collected by the LED light fixture sensors in a room or warehouse or manufacturing floor, for example, and maps out where the most activity is happening. “I actually showed that map to a facility manager and a general manager at a certain point and you just saw his eyes go to saucers because all of a sudden he recognized that he can make other decisions based upon the information I just gave him,” she said.

This particular facility manager oversaw a large warehouse with over 1500 of Digital Lumens’ LED lights installed and collecting data, Smith said. The occupancy map made it possible for him to see where within the warehouse his employees were walking to the most. With this information, the facility manager could then rearrange the inventory in the warehouse so that his employees could pull product off the shelves and get them to the trucks quicker and more efficiently.

“That way he could get the competitive advantage,” Smith said. “It was actually really cool that they were able to take it from a light sensor to actually having inventory management.”

But how can CIOs take advantage of all that IoT has to offer while remaining secure?

Here are five IoT security tips from an IoT startup:

1. Be open to discussing IoT within your organization

Like BYOD, IoT is entering the workplace without the CIO even knowing it, Pincince said. And the reason employees are not talking to the CIO about their use of IoT is because “they think the only thing that will happen is that [the CIO] will say no,” Pincince said. CIOs need to embrace IoT and open up the conversation about security best practices with their employees. Pincince said the CIO needs to come forward and say, “I want to engage, let’s make sure that’s all safe, that all the security information and security policies are in place” and figure out how to be partners with employees using IoT devices.

2. Assess the level of necessity

For CIOs in companies creating connected devices that will be part of the IoT, Smith advises that they make sure the data being collected is absolutely necessary to the overall system.

“Every single piece of data that [Digital Lumens] collects is patently necessary to the function of the system and it’s used to, of course, help facility managers and help business leaders and CIOs make other decisions about their infrastructure and about their company and about how they want to move forward,” Smith said.

3. Principle of least privilege

This is the idea that certain people within an organization either using IoT devices or creating IoT devices don’t need access to certain applications or systems or controls in order to do their job, Smith said. Smith uses a toaster as an example: “We don’t need the toaster to have the ability to turn on or to change or to have access to our credit information.” The same goes for a company’s employees; only certain employees should have access to certain information, controls and systems because that access is necessary for them to do their job.

4. Utilize systems

“Utilize services that will allow you to patch, update security policies, update security controls and patch vulnerabilities in addition to updating firmware,” Smith said. She said that one aspect of Digital Lumens’ system that is very helpful when it comes to security is that it allows the team to very quickly update the software and hardware.

5. Use as few services as possible

Digital Lumens, for example, only uses services that are absolutely necessary to make the system work, Smith said. “In our case we only use a service that allows us to provide the most support and we also use a service that allows customers to very quickly interact with the system in a familiar interface — mainly a webpage,” she said. Other than that, everything else is turned off. “Turn off all the services that you don’t need, only use those things that you absolutely need to get your job done,” she said.

Let us know what you think about the story; e-mail Kristen Lee, features writer, or find her on Twitter @Kristen_Lee_34.

March 31, 2015  1:04 PM

In SMBs, the CFO role in IT decisions grows

Fran Sales Fran Sales Profile: Fran Sales
CFO, CIO, Gartner, IT decision-making, SMB, Surveys

CFOs have long played a key role in making IT investments, and in recent years this influence has not only been maintained, but is growing, according to research from Gartner based on a survey of about 200 senior financial executives of all sizes from various industries.

Overall, the June 2014 survey found that 29% of CFOs made IT decisions, compared with 24% from 2013 and the same percentage from 2012 — more authority over IT than any other executive, including the CEO (23%) and the CIO (5%). But more significantly for small and medium-sized businesses (SMBs), the CFO’s rising influence is even more apparent in those organizations: Thirty-eight percent of CFOs authorized technology investments in small businesses (those with as much as $50 million in annual revenue), compared with 35% at midsize companies (more than $50 million to $1 billion) and 14% at large enterprises (more than $1 billion).

Another interesting finding is that in SMBs, there’s a higher occurrence of CIOs reporting to CFOs. The midsize-company group showed the highest occurrence, at 58%, followed by small organizations (49%) and large businesses (35%). The report does issue a caveat about the bias in the study — that technology-minded CFOs were more likely to respond than those with only a fleeting interest in IT. Given this pool of respondents, the number of occurrences of IT reporting to the CFO in the SMB group is substantially higher compared with other Gartner surveys, the report’s authors said.

SMBs lack CIO-CFO partnerships

However, despite CFOs’ growing IT decision making role, not many are partnering with their CIOs on those decisions, particularly in SMBs, the study found. Only 14% collaborated with IT on IT decision making in midsize companies, and a mere 11% work with their CIOs in small organizations (in large organizations, the number is slightly higher, at 16%). This data indicates that although these financial executives understand how crucial technology is to business success, quite a number of them see themselves as either directly responsible for IT or at least a major authority on IT decisions. These perceptions make sense, according to Gartner, because CFOs are generally tasked with controlling their organizations’ budgets and examining the highest-value items. But furthermore, the data seems to suggest a gap: Something is holding these executives back from consulting with CIOs when making these decisions.

While the Gartner report doesn’t offer any possible reasons for this gap, CIO analyst and ZDNet columnist Michael Krigsman believes that other recent survey reports that show similar results indicate that many CIOs still lack credibility and respect from their business peers, and points to three contributing factors in his column, including the persistence of old perceptions of IT as just about infrastructure and CIOs’ struggling to find their place in a digital world where IT expectations have shifted.

So what should SMB CIOs do to address this divide? The Gartner report’s authors strongly urge companies to make sure not only that their CFOs are educated about technology, but that CIOs and CFOs are speaking a common language when it comes to how to use this technology for competitive advantage. “CFOs and IT professionals need to understand how the CFO should be involved, to ensure that the right investments are selected in IT to deliver the right benefits based on the organization’s goals and strategies,” they write. Krigsman’s advice on how to start: “spending more time with business departments and leaders, learning nuances of their needs and goals.”

March 27, 2015  7:39 PM

Graph analytics’ renewed life; get friendly with CFOs to get ahead

Brian Holak Brian Holak Profile: Brian Holak
BPM, CFO, CIO, Compliance, Data Analytics

Graph analytics is not new, but it’s taken on a new life in the enterprise—partly due to better, faster and cheaper technology. Senior News Writer Nicole Laskowski explores the trend and lays out how Goldman Sachs is using a homegrown graph analytics platform for compliance, surveillance and fraud detection.

Want to get ahead? Partnering with your CFO might be the perfect next step. Following Google’s announcement that Wall Street bigwig Ruth Porat will be their new CFO, Site Editor Fran Sales discusses the growing CFO role in making technology investments and the benefits of a strong CIO-CFO relationship.

Post-Millennials—referred to as Gen Z—are set to shake up workplace culture. In a recent video interview, Tom Koulopoulos, co-author of The Gen Z Effect, spoke to SearchCIO about Gen Z-ers now entering the workplace in force and how CIOs can take advantage of that.

Business process management (BPM) systems can be great for your company—except when they’re being used to cover up bad workflow processes. SearchCIO expert Niel Nickolaisen talks about the appropriate use of BPM systems, and how using it as a replacement for process and system simplification can negatively affect your company.

Speaking of BPM, how has digitization affected traditional business process management? SearchCIO expert Harvey Koeppel argues that the BPM lifecycle hasn’t changed as much as you’d think.

Is your business set up to fail? If the leaders of a startup don’t share a common vision, the answer may be “yes.” Take this leadership survey, created by SearchCIO expert Bryan Barringer, to find out if your company is in trouble and what you can do to stop impending disaster.

Should you upgrade to the 802.11ac standard? SearchCIO expert Matthew Craig gives tips on conducting a formal evaluation and talking to network vendors about whether your core equipment can support it.

According to Forrester, CIOs will be the ones running the Internet of Things (IoT). But are they ready? Features Writer Kristen Lee outlines five IoT challenges and five steps that can help CIOs handle them.

Over on the IT Compliance Advisor blog, Sales runs down the latest security and compliance headlines—including the FBI’s quest to expand its hacking authority, the Pentagon’s new program to protect personal data, and a new report that finds most companies fail PCI compliance tests.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

March 20, 2015  8:29 PM

Embedded IT vs. central IT; Facebook’s foray into mobile payments

Brian Holak Brian Holak Profile: Brian Holak
Central IT, GRC management, IT, Mobile payments, Mobility, Shadow IT

Looking to deal with the issue of shadow IT? Then it’s time to rebuild the relationship between embedded IT and central IT. According to ITSM expert George Spalding, the key to solving problems both company-wide and between the two groups hinges on bringing them together and establishing a common language centered on services rather than technology components.

As Site Editor Fran Sales writes, you can now send instant messages and money transfers in the same Facebook conversation. Why does this matter to CIOs? In the latest Searchlight, Sales talks to an IT expert to find out whether this Facebook Messenger feature is the next possible mobile payments disruptor.

BYOD, IoT and mobile devices — how are these impacting wireless networks? In this Q&A, Editorial Director Sue Troy talks with networking expert Craig Mathias to find out how disruptive technologies and devices are shaking up wireless protocols and networks.

How familiar are you with Regulation Systems Compliance and Integrity (Regulation SCI)? In this Q&A, SearchCompliance expert Jeffrey Ritter discusses how SEC oversight expands under Regulation SCI, and how the new rule could mean big changes for IT compliance.

In the latest TotalCIO blog post, Features Writer Kristen Lee explores Gartner’s recent statements about the need for IT departments to be open to and aware of startup-like entities — a trend known as bimodal IT — within your IT organization.

What does the FCC ruling mean for innovation and privacy? Read this #GRCChat recap to get SearchCompliance editors’ and followers’ take on the new net neutrality norm.

Are you properly managing renegade IT at your organization? Assess your IT management skills with this CIO quiz.

Speaking of shadow IT, join SearchCIO editors, fellow tweeters and guest expert Derek Lonsdale on Wednesday, March 25, at 3 p.m. EST for our #CIOChat to talk about dealing with shadow IT and effectively managing IT services. We’ll also be discussing the difference between healthy and unhealthy shadow IT.

But that’s not the only chat happening this week! On Thursday, March 26, at 12 p.m. EST, SearchCompliance editors and followers will be talking GRC management in the digital age in the next #GRCChat. Discussion may include how to avoid both regulatory and consumer risk, the risks created by customer-centric technology, and the lack of business incentives. See you there!

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

March 13, 2015  7:53 PM

Profiting from your digital strategy; PayPal boosts innovation via startup acquisition

Brian Holak Brian Holak Profile: Brian Holak
CIO, Cloud Computing, Cloud management, innovation, Mobile

Are CIOs being seduced by digital eye candy instead of thinking about profitability? In the latest Data Mill, Mark McDonald, managing director at Accenture, gives tips on how CIOs can maximize profit and avoid relying on the old way of doing things when forging a new digital strategy.

PayPal’s is buying mobile wallet startup, Paydiant, for about $300 million. Features Writer Kristen Lee talks to market analysts and gets their take on the acquisition and its implications.

The highly anticipated Apple Watch has arrived. Will it be the enterprise’s next big device? In this week’s Searchlight, Associate Editor Fran Sales discusses the Apple Watch and investigates how it could affect the enterprise.

As mobile computing technology evolves and data proliferates at an increasing rate, how can business make the most of the situation? In this feature story, Senior News Writer Nicole Laskowski explains that companies need to join the two forces—mobile computing and data–in order to compete effectively.

How can CIOs best manage cloud data and applications while mitigating risk? In this SearchCIO Essential Guide, we explore cloud risk management best practices that can help your company master the private, hybrid and public cloud and maximize business value.

Think your cloud governance strategy is on point? Take our quiz to test your knowledge of cloud computing management essentials that can make for a smooth cloud transition and help your business avoid IT risks.

Staff shortages in the current threat-laden environment can be dangerous to a company’s security and compliance strategies. How can you satisfy the need for talent and keep your business’ security practices on track? SearchCompliance expert Jeff Jenkins shares his experience with staff shortages and gives tips on how to deal with the situation and find the right employees.

On the IT Compliance blog, Sales discusses private companies’ surprising lack of motivation when it comes to strengthening cybersecurity, recent legislation around consumer data processing and the corporate failures predicted for 2015.

Meanwhile, over on the TotalCIO blog, Laskowski explores the benefits of reverse mentoring in helping older workers stay up to date on the latest technology through Millenials’ assistance.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

March 6, 2015  6:45 PM

Automation vs. augmentation strategy; Mobile World Congress 2015

Brian Holak Brian Holak Profile: Brian Holak
Automation, CEO, CIO, cybersecurity, iot, IT systems, Legacy systems

Knowledge workers might soon be competing with machines for jobs. In this week’s Data Mill, analytics thought leader and author Tom Davenport explains the business benefits of computer augmentation and lays out five strategies for surviving rising automation.

What happened at this year’s Mobile World Congress in Barcelona? In this week’s Searchlight, Fran Sales presents highlights from the event, including mobile payment breakthroughs, the push for global Internet access and Blackberry’s transition into a software company. Also in Searchlight: Apple Pay fraudulent activity and Hilary Clinton’s use of personal email.

In the latest CIO Decisions e-zine, SearchCIO experts address a now-timeless quandary: cutting versus keeping legacy IT systems. Find out how to decide which systems are worth keeping and hear legacy systems management success stories.

Are CIOs ideal picks for next-generation CEOs? Some IT leaders think so. In this TotalCIO blog post, Executive Editor Linda Tucci talks to experts and outlines the trending CIO-to-CEO discussion. Also on the TotalCIO blog, Features Writer Kristen Lee covers the Fusion 2015 conference by discussing the Internet of Right Things and the three phases of cybersecurity maturity. The Fusion conference also addressed how entrepreneurs can construct a successful company culture, as Senior News Writer Nicole Laskowski writes in her blog post.

For private sector companies struggling with high-tech compliance, the U.S. Securities and Exchange Commission’s new Regulation SCI could be the answer. SearchCompliance expert Jeffrey Ritter highlights five things all IT teams should know about Regulation SCI.

What are the biggest IoT security challenges facing the enterprise? In this #CIOChat recap, participants list the top IoT security risks and share their lessons learned from BYOD policies.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

February 27, 2015  8:28 PM

Combating social engineering, BYOD security woes with education

Fran Sales Fran Sales Profile: Fran Sales
CIO, cybersecurity, Employee training, Phishing, Small and medium businesses, SMB, SMB security, Social engineering, Social engineering attacks

Think that because your business is not the size of a Target, JPMorgan Chase or Sony means that you’re immune from today’s breed of cyberthreats? Think again. Just because small and medium-sized businesses (SMBs) don’t have the financial resources or the brand reputation many enterprises do doesn’t mean hackers aren’t targeting them, recent studies show.

Why exactly are SMB organizations in these hackers’ crosshairs? It isn’t so much as what’s on their networks, but how attackers can use those networks. “The hackers are looking at that network as another means, as another jump-off point, to go out and get some other networks. They want to turn your network into basically a botnet,” said Page Moon, CIO of Focus Data Solutions, an IT and Web hosting firm, at an IT Nation 2014 session in Orlando, Fla., last year. In other words, SMBs’ systems are a potential entry point into other, larger networks.

And what do SMB IT pros believe is their top cybersecurity vulnerability? Employees. According to a 2014 study by digital security firm Gemalto, which surveyed 438 IT professionals who work in SMB organizations, 77% of these IT pros believe employees to be the single weakest link in their security infrastructure, and a similar percentage — 75% — say that employees, particularly the risk of them unintentionally leaking data, are their top cloud security concern. And there might be a reason for these fears. According to the findings, the two security challenges that top the IT pros’ lists are social engineering (48%) and BYOD management (42%), which both involve employees.

Social engineering threats expected to rise

The first of these security hurdles, social engineering, is a particularly devious form of cyberthreat because it exploits the fact that many SMBs — their employees and IT pros alike — are lacking in security education; for instance, many believe that only back-end operations are vulnerable to the latest cyberattacks, said Moon. And this security gap has a wider scope, according to the authors of Symantec’s 2014 Internet Security Threat Report (ISTR), which examined trends in 2013. “While the ease of installation and cost of maintenance may have decreased, many new administrators are perhaps not familiar with how to secure their servers against attacks from the latest Web attack toolkits,” the authors write. SMB IT admins also aren’t necessarily diligent about security, such as staying up to date with the latest patches, they said.

Social engineering is lucrative for hackers. For example, 62,000 attacks of one common type of social engineering, spear phishing, raked in $233 million in October 2013 alone. Not a shabby profit, considering that one can buy a spam service to send out half a million phishing emails for only $75, according to RSA, the security division of EMC Corp. And spear phishing aimed at SMBs has been on the rise in recent years: In the Symantec study, 41% of the IT pros who work in companies with 1 to 500 employees reported this type of attack in 2013 — a 5% increase from the previous year. And according to Angel Grant, senior manager for anti-fraud solutions at RSA, social engineering attacks are poised to increase this year.

spear phishing, social engineering, symantec, infographic, smbs

Spear Phishing: Targeted Attacks (click infographic for full-size version) Source: Symantec

Employee education reduces risks

It’s clear that it’s not just Fortune 500 companies that are the targets. So how can SMBs arm themselves with the limited resources that they have? For starters, implementing the best security tools and technologies you can afford, perhaps cloud-based security apps, is certainly critical. But you also need to educate your employees. The benefits that come with equipping employees with the knowledge of how to effectively deal with threats are quantifiable — doing so can reduce security risks by up to 70%, according to companies surveyed by the Aberdeen Group recently.

It’s important to note, however, that training employees doesn’t just mean teaching them best practices on creating complex passwords or how to spot suspicious emails, but also changing how they approach their interactions online in general, said Chris Hadnagy, founder of security training company Social-Engineer. “If you just want people to follow the rules — don’t think, just do — you create an easy environment for [hackers],” he told Inc.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: