Inside the Briefcase

Briefcase Highlights


Cyber Security – 4 Things to Do to Improve Computer Cyber Security and Prevent Cyber Crime Attacks

November 20, 2017 No Comments

In this article, you will learn to avoid all the silly mistakes most computer owners make and expose their computers and personal information open to cyber attacks. You’ll also discover why it is essential to change your passwords frequently and have up-to-date firewall and antivirus program.

7 New Tech Devices Of 2017 Worth Mentioning

November 17, 2017 No Comments

The Consumer Electronics Show in Las Vegas has finally come to a close and we have rounded up some of the best devices, which were on display. Consumers would definitely have been amazed by a large number of electronics, which had been displayed. We have selected for you 7 of the devices which we feel are worth mentioning.

7 Tips to Boost a Slow Computer

November 15, 2017 No Comments

Is your computer slower than a sloth? Do you spend more time staring at the ceiling than your monitor? When you first bought your computer, it probably ran like a dream. But over time, as you fill it with games, apps, and photos, these files take up space on your hard drive. The result? Your computer runs slower — and you get more frustrated. Before you give up and toss it out the window, try these seven easy tips for speeding up your slow computer.

IT Briefcase Exclusive Interview: The Cloud Security Skills Crisis

November 14, 2017 No Comments

It’s no secret that a security skills gap is hindering cloud adoption. In fact, 49 percent of companies are delaying cloud deployment because of this issue. Enterprises of all sizes are under mounting pressure to cultivate the necessary cloud security skills for migration. That said, how can organizations safely get to the cloud before it’s too late? Srini Vemula, global product management leader of SenecaGlobal, shares more on how companies can minimize risks brought on by a lack of cloud security and address the growing skills gap.

How to Determine If Your Security Systems Are Working

November 13, 2017 No Comments

How well are your company’s security systems working? In our closely-connected world, it can be hard to tell if your data is fully protected from hackers, scammers and others who would want to use it for nefarious purposes. We’ve all seen what can happen when people’s sensitive information is compromised: customers and clients panic, companies scramble to reassure those who are affected and to remedy the situation and security teams start thinking about what they could have done to prevent a breach in the first place.

Transitioning to Digital: Steps to Make Your Online Debut

November 9, 2017 No Comments

The potential of the Internet is limitless, and it’s changing every day. If your small business isn’t already online, it should be. Not only can having an online presence increase your sales, but it could also increase your reputation and credibility. Today, consumers need to trust a store before they buy from it, especially if it’s online and they can’t see the physical object for themselves. To make the transition to digital, however, you need to do it right.

5 New Technoligies You Should Embrace in Your Business

November 9, 2017 No Comments

Increased productivity does more than just get projects executed seamlessly. It helps a lot in cutting costs and saving a lot of quality time which improves the overall ROI. With the ever changing technology trends in the business sector, if you don’t embrace new technologies as soon as they emerge, you might find yourself playing a very tricky game of catch-up in order to stay ahead of the curve and be relevant in your sector. Currently, even smaller players or small business owners have also started maneuvering quickly in order to take advantage of newer technologies whenever they emerge unlike it was in the recent past.

IT Briefcase Exclusive Interview: Getting Into Google’s Buganizer

November 8, 2017 No Comments

Security researcher Alex Birsan was able to gain access to some of Google’s most critical and dangerous vulnerabilities by finding and exploiting a series of flaws in the company’s internal bug tracker called Google Issue Tracker or “Buganizer.” By spoofing a Google corporate email address, he was able to gain access to the back-end of the system and thousands of bug reports, including those marked as “priority zero,” vulnerabilities which are the most severe and dangerous and enable the greatest amount of damage.

The Human Side of Cybersecurity: An Exclusive Q&A with Southeastern Grocers CISO Chris Gay

November 6, 2017 No Comments

Chris Gay, VP and Chief Information Security Officer of Southeastern Grocers and advocate for cybersecurity education, will be leading a roundtable discussion on the topic at the upcoming Cyber Security Exchange in Amelia Island, Florida, this December 4-6. Ahead of the Exchange, we sat down with him to talk cybersecurity education and awareness, challenges to CISOs at large companies, mitigating risks associated with new technology and more.

Top 4 Ways to Protect Yourself Online

October 30, 2017 No Comments

With 72% of British consumers being concerned about how secure their data is online, many businesses are taking action to step up and evaluate their current security measures. However, there is still plenty you can be doing yourself to ensure your own safety and privacy while on the web.

How Facial Recognition is Expanding into the Mainstream

October 25, 2017 No Comments

In 2002, law enforcement officials in New Orleans attempted to bring facial recognition to the public’s eye for the first time. It failed spectacularly. The technology was supposed to be used to during the Super Bowl to detect wanted criminals from among the crowds gathered to watch the game or partake in festivities at the stadium. But facial recognition software of the time proved to be ineffective in crowds and provided too many false positives, and the attempt was considered a failure and met with severe backlash.

4 Steps Your Company Can Take to Improve IT Security

October 25, 2017 No Comments

We live in an era now where basic virus protection software isn’t going to cut it in terms of protecting your IT infrastructure. Many other problems can now arise and it isn’t just cyber-attacks we need to be wary of – it’s also physical access to our computers and servers. If you’re looking to step up your game and secure your IT practices, consider following the below steps.

How to Securely Dispose of Company Data

October 20, 2017 No Comments

Disposing of company data is something that has to happen for several reasons, for example, when hardware hits the end of its lifespan and needs to be replaced. Another reason for data disposal is if a company is trying to merge and condense their data into easier manageable solutions. There are many reasons why it needs to happen but, most importantly, when it does need to happen, it needs to happen with security in mind.

Questions to Ask on Infrastructure for Your Windows 10 Deployment

October 19, 2017 No Comments

Delivering Windows 10 deployment data of 30GB+ over a company WAN reminds me of my brief life as a PC gamer back in the 1990s (ancient tech, 386 and MS-DOS). I became obsessed with a game called Wing Commander. I flew a fighter through space — slowing down to navigate asteroid fields and tangling with enemy fighters — to help get the mother ship safely to its destination before it was too late.

New Report: Companies Passing on Password Security

October 19, 2017 No Comments

You can have the most sophisticated home security system in the world, but if you leave the front door open, it’s all for nothing. The same principle applies to enterprises. Protecting data starts with disallowing unauthorized access, and that begins with a solid username and password. Login information is the “front door” to your company’s data, but according to a recent study, most large companies are leaving basic, “dead-bolt” security measures on the table, potentially losing millions of dollars.

Security vs. Productivity: Is BYOD Worth the Risk?

October 17, 2017 No Comments

As technology continues to advance and BYOD (Bring Your Own Device) workplaces become more and more commonplace, IT leaders everywhere are faced with a critical dilemma: Do we embrace the more productive mobile workplace at the expense of security, or do we sacrifice productivity for peace of mind?

IT Briefcase Exclusive Interview: Assurance, Insurance and Guarantees – Preparing Your Organization for the Data Breach Era

October 17, 2017 No Comments

According to Forrester Research, applications are increasingly the face of interaction between companies and their customers; this includes customer-facing applications, differentiating mobile apps, internet-of-things (IoT) device interfaces and streamlined back-end processes. Meanwhile, application security technologies continue to advance based on new developer methodologies, attack vectors, application types and business needs. Moving forward, security pros must keep pace with these emerging and rapidly evolving technologies to help their organizations deploy apps that improve customer experiences without taking on new risks.

4 Website Security Tips For SMEs

October 17, 2017 No Comments

Small business owners generally don’t take internet security that seriously. I understand, of course: a lot of SMEs are so focused on their day-to-day business that they have no extra time to worry about the complexities of website security. There are other problems, however. A lot of small businesses simply think that they have nothing worth stealing, and that they are too small to ever be the target of a cyber-attack. I shouldn’t have to tell you that this is a mistake, but I will.

Backup to the Future Infographic

October 11, 2017 No Comments

Where is your data stored? Back up will be the number one use of cloud in 2019. Download this infographic to quickly learn a flexible solution for Virtual, Physical and Cloud Environments – no matter how complex.

How VPNs Solve Security Issues For SMEs

October 10, 2017 No Comments

Virtual Private Networks, or VPNs for short, used to be associated with hackers running credit card fraud schemes. In recent years, though, they’ve become hugely popular for more legitimate purposes. A lot of people use them to get around country-specific limitations on TV shows and movies, such as those put in place by Netflix and other media companies. More seriously, a lot of political activists use them to circumvent restrictions put in place by their own governments.

IT Briefcase Exclusive Interview: Minimizing Risks Brought on by the Shadow Workforce

October 4, 2017 No Comments

According to OneLogin’s Curse of the Ex-Employees report, 20 percent of organizations admit accounts belonging to former employees remain active for one month or more after an employee has left the company. Unknown to employers, these “ghost employees” are harboring company data for months or even years after leaving an organization. This has resulted in the growth of a “shadow workforce” – or an underground network of ex-employees with access to the company network. In this interview, we connected with Al Sargent, senior director at OneLogin, who shares how companies can minimize risks brought on by this shadow workforce.

IT Briefcase Interview: Preparing Effectively for a Cloud Migration

October 4, 2017 No Comments

with Peter Kraatz, DatalinkIn this interview, Peter Kraatz at Datalink shares his expertise on the due diligence necessary for organizations to successfully move to the cloud and the challenges IT professionals should prepare for prior to a cloud migration. Read More >>>

Combating Financial Crime: The Increasing Importance of Financial Crimes Intelligence Units in Banking

October 4, 2017 No Comments

This white paper assesses how aware banks in Europe and North America are of FCIUs and what measures they have been taking to be more prepared for full implementation of their own FCIU.

IT Briefcase Exclusive Interview: Solving Complex Organizational Analytics Disconnects with Analytic Deployment Technology

October 4, 2017 No Comments

with Stu Bailey, Open Data GroupIn this interview, Stu Bailey, CTO from Open Data Group, shares how enterprises can make analytic deployment a core competency vital to competing successfully in today’s business environment. Read More >>>

RANSOMWARE: Industrial Control Systems

October 3, 2017 No Comments

70% of surveyed organizations surveyed an OT security compromise over the past 12 months resulting in operational disruption or loss of confidential information in their industrial networks.

IT Briefcase Exclusive Interview: Freeing Data from Vendor Lock-in; Leveraging Data for Today’s Digital Enterprise

October 3, 2017 No Comments

with Cuong Le, Data DynamicsIn this interview, Data Dynamics’ Senior Vice President of Field Operations, Cuong Le, shares his thoughts on why IT professionals need to be put back in total control of their data – and the best ways to make that happen. Read More >>>

5 Steps to Improve Your Company’s IT Security

October 2, 2017 No Comments

As a business owner, you obviously want to make your IT systems as secure as possible. But even if you invest in expensive and sophisticated cybersecurity software, you can still be vulnerable, if you have your basic IT management done wrong. In fact, most security breaches are results of simple mistakes that could have been easily avoided. Here are five tips to make your IT environment a safer place by just doing the basic things right.

Awareness, Education, Prevention: The 3-Factor Approach to Mitigate Insider Threats

October 2, 2017 No Comments

Insider threats continue to be an organization’s number one weakness. This is because an insider is able to bypass any firewalls, detection systems, or access gates. Most breaches that are the result of insiders happen from negligent employees or managers. Malicious insider incidents are fewer but often cause far more damage. How much damage can one employee do to an organization? The answer is dependent on access, information quality, and intent. Everyone who works with or in an organization is an insider.

Integrating Security in the DevOps Workflow: Must You Choose Between Time, Change and Efficiency?

September 29, 2017 No Comments

Software and app development is moving at warp speed, thanks to the agile approach and role of DevOps. But security struggles to keep pace, as traditional physical and virtual perimeter solutions are not sufficient to address vulnerabilities in code that are being updated and deployed on a daily basis. As a result, DevOps must become more aware of security and rethink how they build it into their software at the code level. In this Q&A, security industry veteran Manish Gupta discusses how organizations can change their behavior and mindset, bringing security in from the start of the software development process.

Indicators of Compromise in DNS Logs

September 27, 2017 No Comments

Do you monitor your DNS logs? If not, you may be missing important clues about cyber attacks on your network. I recently attended SANS Network Security 2017 and watched a presentation by Seth Misenar on what he calls “actionable detects” in DNS logs. Security teams can use these indicators to prevent and detect security problems.


Gartner Infrastructure

Gartner Application Strategies

IBC 2017

ITBriefcase Comparison Report