The IT director and the board must be aligned on cyber protection (video)

Tom Allen
clock • 2 min read

Communication between the board and IT cannot be solely one way

SMEs are often called the ‘low-hanging fruit' of the security world, with less protection and threat awareness than regulated enterprise firms. To combat this, the aims of the board and the IT dire...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
All change? The CIO challenge in the next five years

Strategy

The new CIO is one who shapes strategy, rather than having it forced upon them

clock 30 April 2024 • 5 min read
Clear skies ahead: Heathrow's tech-driven journey towards fairer flying

Green

‘AI can help optimise flight paths and fuel efficiency’

clock 15 April 2024 • 2 min read
'Few organisations realise cyber tools' potential' - Dan Burns, CISO at Next

Security

Keynote speaker at the Cybersecurity Festival 2024

clock 04 April 2024 • 2 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Threats and Risks

CISA identifies GitLab vulnerability under exploit

CISA identifies GitLab vulnerability under exploit

Hope you have two-factor

Tom Allen
clock 03 May 2024 • 2 min read
Experimental Morris II worm can exploit popular AI services to steal data and spread malware

Experimental Morris II worm can exploit popular AI services to steal data and spread malware

Cornell researchers created worm 'to serve as a whistleblower'

clock 01 May 2024 • 3 min read
UK bans devices with weak passwords

UK bans devices with weak passwords

Under new rules, manufacturers must prompt users to change generic passwords during setup

clock 30 April 2024 • 3 min read