syse-blog-header

BLOG

Jeff Trudel

Recent Posts

What is Shadow IT and how should organizations deal with it?

August 02, 2019

Most employees want to be productive. As cloud service consumers, we have become accustomed to finding a tool or app that will help us fill a need and simply buy it without obtaining approval from our organization first. This practice of employees bypassing IT management to procure tools and services without proper vetting has infiltrated the workplace and is known as Shadow IT.

Read More »

Cloud, Data Management, Compliance, IT Security, Digital Transformation

Organizational Best Practices for Mobile Devices

September 14, 2018

As data moves to the cloud and becomes accessible from anywhere, it’s more important than ever to ensure that both corporate and personal devices being used to access data and services are secure. There are many options for addressing these security concerns, but choosing the right tools and configurations can quickly become complex. Considering what to do about devices like laptops, tablets and smartphones while in the office, at home, and while traveling can become overwhelming or cumbersome. Some organizations may find a secure one-size-fits-all solution, but many will want, or need, a little more flexibility.

Read More »

Data Protection, Data Management

3 Steps to Secure Information on Mobile Devices

August 07, 2017

Increasingly, organizations are enabling their workforce to be productive from anywhere at any time. Desktops gave way to laptops that could be taken out of the office, cell phones gave way to smartphones and email, and now remote access to the company network is giving way to the cloud and mobile apps. This evolution comes with many benefits, but if it’s not approached with careful thought and planning, it can also come with unacceptable risk.

Read More »

Cloud, IT Strategy, IT Security