Mobile Device Security Importance of mobile device security – In the today’s world, it is very unusual to find anyone…
Read More »CIATEC Staff
Steps to Build an Effective ITSM Strategy To have a comprehensive and implemented IT service management ITSM strategy comes from…
Read More »GDPR: the new sheriff in town! The EU General Data Protection Regulation (GDPR) replaces the Data Protection Directive 95/46/EC and was designed…
Read More »Effective Digital Marketing Techniques While “Go-to-Market” concept is still a thing in our countries, digital marketing techniques through digital technologies…
Read More »What is ISO 27001:2013? ISO/IEC 27001:2013 is the standard for Information Security Management; ISO 27001 is part of the ISO…
Read More »Security in Banking Sector Information security is the prime area of concern when using internet and is of utmost importance…
Read More »Is it time to change your allegiance? We live in a hyper-connected, high-speed world today. Advent of the Internet has…
Read More »Why Virtual Desktop Infrastructure (VDI)? Everyone is talking about virtualization! Yet as with any technology, it can be challenging to…
Read More »The Origin of Defense in Depth The notion of in-depth defense originates from the military model, which demonstrates that it…
Read More »What Does DRP Mean? A Disaster Recovery Plan (DRP) is a business plan that describes how work can be resumed…
Read More »