IT Risk Management Articles

Sorted By: Most Recent
Andre Ferraz Andre Ferraz
Updated on August 30, 2024

3 Ways to Combat Fraud Across the Entire Organization

Support for an integrated fraud prevention program needs to come from the highest rungs of leadership and should focus on these three key goals.

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on August 14, 2024

3 Ways to Protect Your Wearables and Rugged Devices From Cyber Attacks

It’s time to treat non-traditional endpoint security with the same urgency as smartphones and laptops. Here’s how.

Image: Shutterstock / Built In
Akshay Kumar Akshay Kumar
Updated on August 09, 2024

SSH Port Forwarding (SSH Tunneling): How-To Guide

SSH port forwarding is a method for safely transmitting data over an encrypted SSH connection between a local and distant server. Here’s what to know.

Image: Shutterstock / Built In
Shrav Mehta Shrav Mehta
Updated on August 08, 2024

8 Ways to Protect Your Company Against Ransomware Right Now

Cyber attacks are on the rise and only getting more sophisticated thanks to AI. But there are steps you can take to defend your company against ransomware attacks. Here’s how.

Image: Shutterstock / Built In
Tyler Owen Tyler Owen
Updated on June 04, 2024

IoT Security is a Challenge. Here’s How to Tackle It.

Our expert explores advanced strategies to shield the Internet of Things from evolving threats.

Image: Shutterstock / Built In
Matthew Urwin Matthew Urwin
Updated on April 22, 2024

What Is Financial Risk Management?

Financial risk management includes identifying, assessing and addressing potential threats to a business’s financial resources.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In
Kevin Miller Kevin Miller
Updated on April 20, 2024

The 3 Hammers of IT Management

By creating or purchasing self-service tools, your IT department can decrease the cost of operation, lower queue times and increase customer satisfaction.

Edward Hearn Edward Hearn
Updated on April 19, 2024

Are You Thinking About Risk the Wrong Way?

To make effective risk assessments, you need to understand the difference between relative and absolute risk.

Vaidotas Šedys Vaidotas Šedys
Updated on April 15, 2024

How Open Source Intelligence Can Protect You From Data Leaks

In honor of cybersecurity awareness month, our expert explains what OSINT is, how it works, and what you should be focusing on to protect yourself right now.

Image: Shutterstock / Built In