Blogs

Read about challenges organizations face in today’s dynamic business environments

Difference between PMBOK 5 and PMBOK 6

02 October 2017Written by:
Published in: Blog
This blog reviews the difference between the PMBOK Guide Fifth Edition and the recent Sixth Edition which was announced on 6th September 2017.

In order to keep up with the recent practices in project management, PMI seeks inputs from the industry practitioners and updates its Project Management Body of Knowledge every four years.

Benefits for Becoming a CGEIT

17 August 2017Written by:
Published in: Blog
Management and boards have long realized the need for corporate governance. As Information technology becomes important for achievement of Organizational goals and delivery of benefits, there has been an increasing understanding that governance must be extended to IT as well. IT governance has gradually become an integral part of enterprise governance and consists of leadership, organizational structures and processes ensuring sustenance of IT in the organization and its extension to organization strategies and objectives. The Certified in the Governance of Enterprise IT (CGEIT) program recognizes those who have the necessary level of professional knowledge, business experience and personal skills to maximize contribution by IT to an enterprise’s success meanwhile mitigating risks posed by IT.

Think of opening a word document or a PDF; Oops! you see a pop up of data encryption right on your screen! It is enough to give you a heart stroke if you have data worth a million US dollars right on the device that was infected with the malware called Ransomware. This nasty malicious software threatens to publish the confined data or perpetually block access to it until a ransom is paid. When a computer is infected, the ransomware contacts a central server for the information it requires for activation and later begins encrypting files on the infected computer with that information. Now once it is done encrypting all the files, it posts a message and asks for a payment to decrypt the files and threatens to destroy the data if the ransom is not paid.

Get the latest news