Remove Company Remove Strategy Remove Systems Review Remove Weak Development Team
article thumbnail

8 data strategy mistakes to avoid

CIO

Organizations can’t afford to mess up their data strategies, because too much is at stake in the digital economy. Unfortunately, the road to data strategy success is fraught with challenges, so CIOs and other technology leaders need to plan and execute carefully. Here are some data strategy mistakes IT leaders would be wise to avoid.

Strategy 340
article thumbnail

The CIO’s primary job: Developing future IT leaders

CIO

But it is equally vital to identify those people who can develop into managers and create a path forward for them as well. In my most recent CIO.com article on nurturing high-performing teams , I made a comment that stirred some questions. And if people have bad managers, the results can be less than optimum.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

10 cloud strategy questions every IT leader must answer

CIO

Companies may have had highly detailed migration or execution plans, but many failed to develop a point of view on the role of cloud in the enterprise. Although some continue to leap without looking into cloud deals, the value of developing a comprehensive cloud strategy has become evident. There are other risks, too.

Strategy 363
article thumbnail

Simple sabotage for software

Erik Bernhardsson

It laid out various ways for infiltrators to ruin productivity of a company. You can of course make a series of obviously bad decisions, but you'd get fired quickly. The real goal here is to sap the company of its productivity slowly, while maintaining a façade of plausibility and normalcy. What are some things you can do?

article thumbnail

Don’t gamble with your identity verification practices

CIO

Earlier this year, I wrote about the importance of organizations reviewing their password management strategies. According to reports, MGM and Caesars were both customers of identity management company Okta. The formula is well-known: black hat hackers encrypt a company’s data and demand a ransom payment for the decryption key.

article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. Once inside the system, the hacker gained access to files uploaded by Okta customers using valid session tokens from recent support cases.

article thumbnail

10 digital transformation roadblocks — and 5 tips for overcoming them

CIO

In today’s fast-paced business world, companies are striving to harness the power of digital technologies to reinvent their operations, enhance customer experiences, drive innovation, and thereby create value for stakeholders. Poor execution Even the best plans can fail if execution is poor.