IT Risk Management Articles

Sorted By: Most Recent
Rob Chamberlin Rob Chamberlin
Updated on December 06, 2024

Why Physical Security Is Still Critical for Tech Companies

Physical security breaches can be just as costly as cyberattacks. Follow these steps to mitigate the risks and protect your data.

Image: Shutterstock / Built In
Scott Wheeler Scott Wheeler
Updated on November 26, 2024

Automations Are Great, But Cloud Security Still Requires Hard Work

These seven cloud security best practices are most effective when handled by humans.

Image: Shutterstock / Built In
T.K. Keanini T.K. Keanini
Updated on November 21, 2024

Cybersecurity Tools Are Too Complicated. Here’s Why That’s a Problem.

There’s a growing gap in the cybersecurity market as tools become too complex and expensive for smaller businesses to implement. Here’s how to solve it. 

Image: Shutterstock / Built In
Nazy Fouladirad Nazy Fouladirad
Updated on October 01, 2024

So, You’ve Been Hacked. Now What?

Cyber attacks can happen to any company. Here’s what to do after a breach and how to protect your business against another one.

Image: Shutterstock / Built In
Michael Schank Michael Schank
Updated on September 04, 2024

How to Build Operational Resilience With Process Management

With the Process Inventory Framework, you can make your organization more robust, secure and compliant. Here’s how.

Image: Shutterstock / Built In
Andre Ferraz Andre Ferraz
Updated on August 30, 2024

3 Ways to Combat Fraud Across the Entire Organization

Support for an integrated fraud prevention program needs to come from the highest rungs of leadership and should focus on these three key goals.

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on August 14, 2024

3 Ways to Protect Your Wearables and Rugged Devices From Cyber Attacks

It’s time to treat non-traditional endpoint security with the same urgency as smartphones and laptops. Here’s how.

Image: Shutterstock / Built In
Akshay Kumar Akshay Kumar
Updated on August 09, 2024

SSH Port Forwarding (SSH Tunneling): How-To Guide

SSH port forwarding is a method for safely transmitting data over an encrypted SSH connection between a local and distant server. Here’s what to know.

Image: Shutterstock / Built In
Shrav Mehta Shrav Mehta
Updated on August 08, 2024

8 Ways to Protect Your Company Against Ransomware Right Now

Cyber attacks are on the rise and only getting more sophisticated thanks to AI. But there are steps you can take to defend your company against ransomware attacks. Here’s how.

Image: Shutterstock / Built In
Tyler Owen Tyler Owen
Updated on June 04, 2024

IoT Security is a Challenge. Here’s How to Tackle It.

Our expert explores advanced strategies to shield the Internet of Things from evolving threats.

Image: Shutterstock / Built In