Inside the Briefcase






Briefcase Highlights


SECURITY

Infographic: 6 Steps to Disaster Recovery Preparedness

August 25, 2015 No Comments

Expedient’s new guide, 6 Steps to Disaster Recovery Preparedness, outlines key ways that IT leaders can prepare for a disaster before it strikes. More than 70 percent of companies are not currently confident in their ability to restore data in the case of an outage. Collectively, companies cited $754 billion in data loss and $954 billion in downtime in 2014. Are you really ready for disaster recovery?

Could Outsourcing Cyber Security Be Weakening Your Cyber Defence?

August 25, 2015 No Comments

When we outsource any aspect of our business we are naturally reducing our own control over the outcome and with electronic data our exposure comes from two distinct angles. First, we are putting our trust in people who are not direct employees of our company and we are allowing more individuals access to our business systems. Second, we will often store data off-site on hardware which we do not have direct control over in terms of security.

Insider Threats: The Real Problem Is Not Knowing There’s a Problem

August 6, 2015 No Comments

The SANS Institute recently released its latest report, “Insider Threats and the Need for Fast and Directed Response[1],” based on responses from more than 770 IT/security professionals in a range of industries. The report makes the case that although external attacks have been getting more press, attacks from within often cause the most damage: insiders typically have unfettered access to sensitive data—and with most companies not set up to detect such attacks, they can continue undetected for long periods of time, doing significant damage.

Hiding in the Cloud

August 4, 2015 No Comments

Researchers have detected Russian hackers operating in plain sight using the cover of legitimate services including Twitter, Github and cloud storage services to steal data from organizations during the work day. Recently, a cyber gang known as APT29 created malware called Hammertoss which is very hard to detect. Using a variety of Twitter handles daily, they are able to send commands to infected machines using images embedded with encrypted command information, these commands allow them to upload the stolen information to cloud storage services. They also infect legitimate web servers and usethem as part of their command and control infrastructure.

4 Steps to Protect Your Computer from Data Loss

August 4, 2015 No Comments

Perhaps the most valuable thing about your computer is the data and files that you have saved on it. After all, the main reason for having your PC or laptop is in order to store the data that is on it, and it’s the main priority for putting a protective strategy in place, such as anti-virus software. Whilst operating systems and downloadable software can always be re-downloaded or re-installed, unique, user created data has the potential to be lost forever. Let’s look at some simple steps that can be taken in order to protect your computer or laptop from data loss.

IT Briefcase Exclusive Interview: BYOD Planning with an Eye for the Future

July 30, 2015 No Comments

with Israel Lifshitz, NuboIf you’ve been tracking the evolution of our BYOD work culture, you’ll know that most enterprises are at some stage of getting a grip on a myriad of issues, including employee adoption, compliance, Shadow IT and user privacy just to name a few. Read More >>>

Will Windows 10 bring revival to its mobile platform?

July 29, 2015 No Comments

With the release of Windows 10 comes another opportunity for Microsoft to align its direction for mobile to better serve developers and IT departments. Together with a subtle name change to Windows 10 Mobile, Microsoft is looking to draw a line in the sand on its failed attempt to chase Apple in the consumer market with Windows Phone.

The Clock is Ticking on Windows Server 2003 Support

July 23, 2015 No Comments

This white paper reviews the risks facing organizations running end-of-life (EOL) platforms like Windows Server 2003 and the options available to address those risks.

Forrester Report: 21st Century Threats Demand 21st Century Security Approaches

July 23, 2015 No Comments

In June 2014, Forrester Consulting was commissioned to evaluate a shift in roles and priorities in IT security budgeting and decision-making in the wake of increased prevalence of and attention to targeted attacks and advanced threats.

Forrester Report: Best Practices For Public Cloud Security

July 23, 2015 No Comments

This paper follows “The Cloud Manager’s Balancing Act,” which describes the need for cloud managers to balance developer time-to-value with security risk and costs.

Is “Bring Your Own Device” Presenting New Threats to Cyber Security?

July 23, 2015 No Comments

In recent years there has been an increase in the number of companies allowing employees to use their own devices at work including mobiles, tablets and laptops. In fact more than just allowing it, some businesses actually encourage ‘bring your own device’ in their quest to reduce their IT overheads.

IDC Report: Server Security: Not What It Used to Be!

July 23, 2015 No Comments

This paper defines what server security is, examines how and why the server security market is growing.

Requirements Customers Have For Mobile Payments

July 22, 2015 No Comments

by Kristen Gramigna, BluePayMobile payments can equip small businesses to accept payment by credit or debit card, using the mobile device that small-business owners likely have within reach most of the time. While mobile payment technology can benefit both customer and business owner, some customers remain hesitant about them. Read More >>>

4 Steps to Achieve Strong ERP Governance & Get the Most Out of Your Investment

July 21, 2015 No Comments

Enterprise resource planning (ERP) programs are much more than the software brand that runs them — they can serve as the foundation for business success. However, the majority of companies that operate ERP systems today (no matter the platform) struggle to get the most out of their ERP investment, primarily due to issues with governance.

Ransomware Viruses: Am I Infected?

July 21, 2015 No Comments

There are so many options available for both on-site backup and cloud-based backup, there is no excuse for not executing very regular backup. To help prevent your backups being compromised, you should always have an off-site or redundant backup in place. Do not overlook the fact you should be testing that your restoration of files actually works! Always ensure you have adequate access to your backup sources and a function restoration method in place (DropBox, Google Drive and OneDrive are not set up or designed to be a backup service).

How Can MSPs Develop an Integrated Security and Management Solution? Five Best Practices

July 16, 2015 No Comments

MSPs have to delicately dance between two key priorities: constantly scanning for the latest technologies to meet their customers’ changing needs and running the numbers to see if they can afford to provide those new technologies to their customers and do it in a reliable manner. One technology service that MSPs are struggling to figure out is how to add security and systems monitoring to their business portfolios, which is in great demand.

Establishing a Foundation for Enterprise Security Policy in the Public Cloud

July 9, 2015 No Comments

In many respects, Cloud Access Security Brokers are the future of what we currently know as the data center firewall. How so? A data center firewall sits in front of enterprise applications/databases (systems of record) in the data center, providing control and visibility. Increasingly, those applications and databases are moving from the corporate data center to the public cloud – with apps like Office 365, Box, and Salesforce, quickly becoming the norm in the enterprise. In this context, cloud apps become the new system of record. Since the traditional data center firewall can’t see cloud traffic, it can no longer provide the protection that we need.

INFOGRAPHIC: Why the World Needs Better Data Security

July 8, 2015 No Comments

This infographic portrays a new paradigm shift in how enterprises must protect their corporate assets and customer information.

IT Briefcase Exclusive Interview with Learning@Cisco: New Training Needed to Manage the Internet of Everything

July 2, 2015 No Comments

with Tejas Vashi, Learning@CiscoThe Internet of Everything (IoE) is bringing together people, process, data and things to make networked connections more relevant and valuable than ever before. Understandably, this is accelerating the pace of digital transformation. Read More >>>

Your Mobile Wallet Isn’t Safe

June 29, 2015 No Comments

with Dror Nadler, CellroxAs mobile payments barrel forward like a freight train, the potential consequences of cyber breaches grow in severity. 30 percent of U.S. shoppers already use mobile wallets, and 62 percent of shoppers who don’t use a mobile wallet expect to adopt one in the next year, according to a 2015 report from Interactions marketing group. Read More >>>

IT Briefcase Exclusive Interview with NuData Security: Detecting Identity Theft to Prevent Online Fraud

June 25, 2015 No Comments

with Ryan Wilk, NuData SecurityIn this interview, Ryan Wilk, director of Customer Success for NuData Security, talks speaks with IT Briefcase about just how serious data breaches can be to both the consumer and the organization, the latest trend in fraud and the best way to stop fraud before it starts. Read More >>>

Hurricane Season: Electronic Protection Tips

June 25, 2015 No Comments

June 1st marked the start of hurricane season and tropical storms are top of mind for companies in prime locations. Taking preventative measures that businesses can take to protect important data including accounting paperwork, employee documents and sensitive customer information, should be a priority.

Overcoming the Double Vulnerability of Open Source Software and Poor Secure Shell Key Management

June 23, 2015 No Comments

Just a handful of years after the Internet became available to the public, the need for encryption became apparent. Without a way to encrypt user information and websites, private data could be stolen by hackers. That would make online interactions unsafe, which would render online shopping and important Web-based communications (with government agencies, for instance) impossible.

Bitcoin Security Receives a Much-Needed Upgrade

June 8, 2015 No Comments

Even if you can’t quite explain what Bitcoin is or how it operates, chances are that you have at least heard of it. This leading-edge cryptocurrency has been shaking up notions of what currency is and how value is transmitted since its founding in 2008. Bitcoin is intriguing to investors, technology watchers and even a few bankers due it is blockchain technology, a transaction database shared by all nodes participating in a system based on the Bitcoin protocol.

Maintaining business continuity during storm season and beyond

June 8, 2015 No Comments

In today’s business technology-driven environment, it’s not a matter of “if,” but “when” business will encounter a breach or breakdown in the system. While this is especially true in areas like Tornado Alley, these concerns don’t just apply to tornado season. Natural disasters and extreme weather can unexpectedly hit throughout the year, so it is critical for organizations to approach business continuity and disaster recovery (BC/DR) as a proactive vs. reactive discipline.

Streamlining the Compliance Process with Automated Monitoring

June 5, 2015 No Comments

So far this year, three large health insurers have disclosed data breaches that affected millions of customers. Social Security numbers, addresses, birthdays, even information about medical conditions, have been stolen for sale to the highest black market bidder. And while the cyber criminals are making money hand over fist, breached companies are losing it.

Doing Versus Planning: The New Way to Build Enterprise Apps

June 4, 2015 No Comments

Aygun Suleymanova, Progress SoftwareWhether a developer is building mobile apps for a small- to medium-sized organization or a multinational enterprise, the apps themselves have to be enterprise-ready. Read More >>>

IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

June 3, 2015 No Comments

Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.Read More >>>

KnowBe4 Alert: New Strain Of Sleeper Ransomware

May 27, 2015 No Comments

KnowBe4 CEO Stu Sjouwerman issued an alert to IT managers that there is a new strain of dangerous ransomware infecting employee’s workstations called Locker. The ransomware has infected workstations but sat there silently until midnight May 25, 2015 when it woke up. Locker then started to wreak havoc in a massive way. Since the strain reared its ugly head, Reddit has been swarmed with hundreds of 600 comments in the first 24 hours.

NIST Releases New Guidelines for Supply Chain Security

May 27, 2015 No Comments

The National Institute of Standards and Technology (NIST) released new guidelines for managing risk in the supply chain. Aside from the legal ramifications of using unauthorized or counterfeit software, the focus of the guidelines centers around the potential risk introduced via third-party software, which includes commercial off-the-shelf (COTS), Government off-the-shelf (GOTS) and open source software (OSS). From a security practitioner’s viewpoint, each of these third-party software “products” introduces unknown risk to internal applications.

ADVERTISEMENT

Gartner Security and Risk

Gartner Data Center Las Vegas

Big Data Tech Con

Gartner BPM Summit

American Customer Festival

SPTECHCON

Red Hat JBoss Busines Automate

Cyber Security Exchange

ITBriefcase Comparison Report