IT is evolving at an accelerated pace today, thanks in large part to virtualization, cloud computing and big data. While these trends can lower costs and increase efficiency, they are too often delivered via point products that offer only marginal improvements to the traditional approach.
by Ken Donoghue, Peak 10We often hear the three concepts expressed in the title above used interchangeably. For example, it’s not uncommon for someone to say, “I have a disaster recovery (DR) plan. We back up our files once a day.” Or, “We replicate our data to tape and store it offsite.” Read More >>>
Tampa Bay, FL. A growing number of high profile breaches may be causing breach fatigue, according to Security company KnowBe4. A study conducted by the Ponemon Institute and reported last week by USA Today, noted a staggering 43% of companies have experienced a data breach in the past year, up by 10% over the year prior.
Over the last year, data breaches in businesses have been big news: Target, Home Depot, eBay, LinkedIn. What most don’t know is that the Target breach actually occurred when an employee of a small HVAC company opened a malware-laced email, allowing the HVAC company’s system to be hacked. It just so happened that this particular company was contracted with one of the Target stores and had remote access for maintenance purposes.
The recent string of media reports about phishing or email password hacking security breeches,like the iCloud celebrity nude picture leak, have caused a media frenzy. This particular case received worldwide attention because the leak involved celebrities. However the reality is that email hacking happens all the time in personal and professional email accounts.
The 7 Must Do Defensive Measures to protect your personal data.
While many approaches are being used to control the impact of the mobile age on IT, VMI technology shows your organization can both embrace and thrive in this new world.
Is there any reason to think that widespread media coverage of large-scale electronic spying by the National Security Agency (NSA), exposed by former government contractor Edward Snowden, has spooked the public?
by Bill Manning, APC by Schneider ElectricAs the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime. Read More >>>
The shift to the cloud has been tectonic; however, the IT infrastructures of the last 20 years have not kept pace to adequately protect enterprise networks, data and transactions. Applications are moving to the cloud, so must the corporate security gateway. Enterprises need a cloud application security gateway.
It’s always been important to have a Business Continuity and Disaster Recovery (BCDR) plan in place to make sure your company can continue operating in the event of a hurricane, flood, earthquake, fire or – most commonly – human error. But with data and computing power becoming an increasingly essential part of modern companies’ value propositions and product portfolios, it’s arguably more important today than ever before.
with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>
The poll found that two-thirds of adult Americans who said they are at least somewhat familiar with the NSA revelations believe such companies have violated the trust of users “by working with the government to secretly monitor communications of private citizens.”
with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>
Download this white paper and learn 7 defensive measures to protect your data.
with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>
By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>
By Jim Manias, Advanced Systems Concepts For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of relevant data translates into increased revenues and reduced risks for all financial firms. Read More >>>
When it comes to security, IT pros can’t control everything. Not all threats can be mitigated by following the simple best practices of keeping security software up-to-date and regularly patching vulnerable applications. In addition, not all potentially risky features can simply be turned off, even if IT pros would like to.
For the first time last year, the Office of the Comptroller of the Currency singled out cybercrime as a top bank risk. This year regulators went further, specifically targeting potential network intrusions. Our own research conducted with the Ponemon Institute found that nearly 70% of critical infrastructure organizations surveyed have reported at least one security breach that led to the loss of confidential information or disruption of operations in the past 12 months.
Disaster Recovery isn’t just a buzzword, it’s the difference between surviving a data breach, data loss, or catastrophic event like a hurricane; or ending up as one added statistic to the list of organizations that closed their doors after something goes wrong. Yet, according to a recent study, most organizations do not have an adequate DR plan in place. One underutilized DR solution is to leverage virtualization the right way. Learn more about how Backup Exec can help.
These days, it seems not a day goes by without a data breach story appearing in the news. As these security incidents become more prevalent – not to mention more costly – one of the best things that small businesses can do to prevent them is to learn from others’ mistakes.
In this interview, Zaheeruddin Ahmed B, marketing analyst at Site24x7, a ManageEngine cloud service, discusses the need for a way to monitor mobile apps and mobile-optimized websites — from the perspective of the mobile user — and his company’s efforts to do just that with its industry-first mobile monitoring solution.
By Joe Caserta, Caserta ConceptsOne of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to keep data in-house by investing in the appropriate infrastructure? Read More >>>
Cyber-attacks and fraud maneuvers continue to climb in frequency and sophistication as cybercriminals keep penetrating vulnerable targets. As a result, the annual global cost of cybercrime rises continually and approaches a conservative $400 billion a year. Every day, 1.5 people become victims, and each year, more than 232 million identities are exposed.
by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>
Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
This is the eight edition of what had previously been called the Application Delivery Handbook.
This paper analyzes the top five most dangerous threats to your data center.
With the recent spate of vulnerabilities found in OpenSSL, the security of open-source software has been put under the magnifying glass, with industry experts and software developers weighing the merits of using an open-source versus a proprietary code base. There are valid arguments for both, but ultimately the risk of a vulnerability can be the same whether rooted in proprietary or open source code.