Close

Communication

How Can CIOs Teach Their Employees About Cybersecurity?

CIOs know that training employees is the key to keeping their network secure

I think that we can all agree that keeping the company’s network secure is one of the person with the CIO position’s most important tasks because of the importance of information technology. However, no matter how many firewalls we put in place or how effectively we implement two-factor authentication we […]

Read More

It Turns Out That CIOs Want Their Privacy

What does your office space look like right now? If your company is like roughly 70% of the firms out there, you have adopted an “open office” format where the walls and cubes have all been removed. Something else that often goes away at the same time is a private […]

Read More

Skills That Every CIO Needs To Have

Congratulations on having your company make you the CIO. However, now what? As the person with the CIO job, you are going to have to use your skills to solve a range of challenging technical problems. However, you’re not going to be able to do this by yourself. You’ll need […]

Read More

When Cyberattacked, Should CIOs Share Information About The Experience?

The person with the CIO job, you, is the person who is responsible for securing the company against attacks from outside. We all know that try as we might, we’re not going to be able to prevent the bad guys from trying to break into our networks. However, given that […]

Read More

Is A “Walk And Talk” The Best Way To Connect With Your Direct Reports?

Think for just a moment about the last meeting that you went to. How did that turn out for you? Can you remember what was said? Even more interestingly, were you any healthier once the meeting was over. I’m willing to bet that the answer was no. Don’t you wish […]

Read More

When Should A CIO Tell The World That They Have Been Hacked?

As CIOs we spend a great deal of our time attempting to secure the company’s networks from the bad guys because we understand the importance of information technology. This activity takes on a whole host of different forms: firewalls, end user training, security sweeps, etc. However, sometimes despite our best […]

Read More