• Sections
    • Cloud Computing
      • Amazon Web Services
      • Google Cloud
      • Microsoft Azure
    • Containerization
    • Data Center
    • Mobile Technology
    • MS Exchange Server
    • Networking
    • Office 365
    • Security
      • Hacking & Cyberattacks
      • Malware
      • Compliance & Privacy
      • Ransomware
      • Social Engineering
      • Vulnerabilities
    • Virtualization
    • Windows 10
    • Windows Server
  • Tech News
  • Tutorials
  • Reviews
  • Newsletters
    • WServerNews
    • FitITproNews
  • Podcast
  • Product Directory
  • Webinars
  • About
    • Advertising
    • About Us
    • Contact Us
    • Meet The Team
    • Legal
      • Privacy Policy
      • Terms & Conditions
    • Sections
      • Cloud Computing
        • Amazon Web Services
        • Google Cloud
        • Microsoft Azure
      • Containerization
      • Data Center
      • Mobile Technology
      • MS Exchange Server
      • Networking
      • Office 365
      • Security
        • Hacking & Cyberattacks
        • Malware
        • Compliance & Privacy
        • Ransomware
        • Social Engineering
        • Vulnerabilities
      • Virtualization
      • Windows 10
      • Windows Server
    • Tech News
    • Tutorials
    • Reviews
    • Newsletters
      • WServerNews
      • FitITproNews
    • Podcast
    • Product Directory
    • Webinars
    • About
      • Advertising
      • About Us
      • Contact Us
      • Meet The Team
      • Legal
        • Privacy Policy
        • Terms & Conditions
    Author

    Stephen M.W.

    Stephen regularly writes about technology, business continuity, compliance and project management. He's worked with companies such as Canva.com, EnergyCentral.com, and Citibank.





    Articles / Compliance & Privacy
    Five CISO challenges that must be faced in an increasingly risky world

    The CISO is the pinnacle of a career in information security. To be successful in this role, one must overcome a myriad of CISO challenges.

    Stephen M.W. Posted On March 3, 2021

    Articles / Hacking & Cyberattacks
    Cybersecurity dangers when an employee goes on leave

    While going on leave is good for both organization and employee, there are cybersecurity dangers that emerge when a worker is away.

    Stephen M.W. Posted On March 2, 2021

    Articles / Compliance & Privacy
    Privacy-as-a-service: Why it’s the future of privacy management

    Privacy-as-a-service is increasingly looked upon as a smart, practical solution in the future management of privacy risks.

    Stephen M.W. Posted On February 12, 2021

    Articles / Hacking & Cyberattacks
    Cyberattack recovery plan: Have one ready before it's too late

    A cyberattack recovery plan should be designed and ready to go well before a cyberattack occurs. Here’s some tips to make your plan a reality.

    Stephen M.W. Posted On February 11, 2021

    Articles / Hacking & Cyberattacks
    White hats to the rescue: The growing need for ethical hacking in cybersecurity

    Cyberattacks are one of the greatest risks facing today’s organization. Ethical hacking is proving to be an effective form of cyber-defense.

    Stephen M.W. Posted On February 5, 2021

    Articles / Compliance & Privacy
    These are 10 of the hottest IT security careers today

    While nearly all IT jobs are expected to see rising demand well into the future, it’s IT security careers that show greatest promise.

    Stephen M.W. Posted On January 19, 2021

    Articles / Hacking & Cyberattacks
    Restoring reputation and customer trust after a data breach

    Managing the aftermath of a data breach is ultimately about winning customer trust and restoring reputation. Here’s how to do that.

    Stephen M.W. Posted On January 15, 2021

    Articles / Hacking & Cyberattacks
    5 techniques for determining IT security budget ROI

    IT security investments don’t directly increase revenue. Thus, unconventional methods of IT security budget ROI calculation are necessary.

    Stephen M.W. Posted On January 8, 2021

    Articles / Security
    Outsource IT security? Here are five reasons you should do it

    While there are advantages of running IT security in-house, there’s instances when organizations should outsource IT security for survival.

    Stephen M.W. Posted On December 21, 2020

    Articles / Ransomware
    Ransom payment after ransomware attacks: Yes or no?

    If you are hit by ransomware, you have a choice to make: Make the ransom payment or not. The decision is never easy, and it differs by company and incident.

    Stephen M.W. Posted On November 6, 2020

    1
    Older Posts
    • Join Our Newsletter

      Learn about the latest security threats, system optimization tricks, and the hottest new technologies in the industry.

      Over 1,000,000 fellow IT Pros are already on-board, don't be left out!

    • Latest Podcast


    • TECHGENIX

      techgenix logo

      TechGenix reaches millions of IT Professionals every month, and has set the standard for providing free technical content through its growing family of websites, empowering them with the answers and tools that are needed to set up, configure, maintain and enhance their networks.

    • Recent Posts

      • Trench Tales: Using Intune for mobile device management of privately-owned devices
      • Another school district hit by ransomware attack
      • An absolute beginner’s guide to Microsoft Hyper-V revisited

    Copyright © 2021 TechGenix Ltd. | Privacy Policy | Terms & Conditions | Advertise
    Press enter/return to begin your search