If a tornado destroys your data center, that's an obvious DR scenario. However, the vast majority of extended service interruptions are caused by relatively minor events,...
|
14
|
The administrative rights policy grants access to individuals’ desktop, laptop, or other end-user devices within a company for those who are qualified and cleared to use...
|
13
|
The Level II Service Desk Technician's role is to ensure proper computer operation so that end users can accomplish business tasks. This includes actively resolving...
|
13
|
Business and IT leaders have come under increasing pressure to cut costs, in part due to hype surrounding the cost-cutting potential of outsourcing.
|
13
|
The Level I Service Desk Technician's role is to ensure proper computer operation so that end users can accomplish business tasks. This includes receiving, prioritizing,...
|
12
|
The Knowledge Manager's role is to collect, synthesize, organize, and manage corporate information and in support of business units across the enterprise.
|
12
|
When disaster strikes, normal operations of the enterprise are suspended and replaced with operations spelled out in the disaster recovery plan (DRP). Recover from the...
|
11
|
The data center access policy will outline the standards for regulating access to the company data center(s).
|
10
|
Do you need to make a difference this week? This month? Take a look at these tactics and tools to build your guerilla plan.
|
10
|
IT security is often overlooked and misunderstood by enterprises. Many feel that they have nothing worth stealing and any money spent on security is a wasted investment....
|
9
|