Inside the Briefcase

Briefcase Highlights


The Security Problem with IT Sprawl

January 16, 2017 No Comments

Tweet Featured article by Rick DelGado, Independent Technology Author With new developments in technology, companies are desperate to stay ahead of their competitors and keep up with the higher expectations consumers are adopting. There are only so many resources to leverage, so many have decentralized their IT infrastructure, according to a VMware survey that discovered […]

Tips to Minimize the Impact of a Security Breach

January 13, 2017 No Comments

The SecureWorks Incident Management and Response team developed the following recommendations to help IT and IT security organizations minimize the duration and impact of a security breach.

Security and Risk Consulting: The Value of Penetration Testing

January 13, 2017 No Comments

The threat posed by hackers is persistent, and it is important to maintain a strong defense to protect your organization. Using real-world testing on your network determines areas where you may be vulnerable.

Five Critical Rules for Firewall Management: Lessons from the Field

January 13, 2017 No Comments

Firewall management remains an organization’s primary network defense. And it’s easy for security managers to get wrong. Download this white paper and learn lessons from the field.

Avoiding IT System Breakdowns

January 11, 2017 No Comments

With the holiday season behind us, e-commerce and retail companies are recovering from the accelerated pace of their peak season. The National Retail Federation found that more than 154 million consumers shopped or planned to go shopping over the Thanksgiving weekend alone. Out of this number, around 40 percent shopped in-store. With this type of traffic, retail companies need to know that their systems will be able to handle high traffic loads.

Cisco Annual Security Report 2016

January 9, 2017 No Comments

Learn how to become more resilient to new attacks and compete more safely in the digital age with the Cisco 2016 Annual Security Report.

Emerging Fire Protection Technologies to Watch

January 9, 2017 No Comments

Fire hazard is no joke, and everybody knows that. Humans dread fire for a reason – it destroys everything in its path. Although the fire did not evolve, the technologies that we use to fight it did. These improvements in the fire protection field now make it easier to detect, suppress and extinguish fires. Every step we make with these improvements is a step towards saving lives. Here are some of the newest technologies in the firefighting field.

The Necessity Of Security Audits For Open Source Projects

January 5, 2017 No Comments

Curl, an open source application installed on hundreds of thousands of servers, was found to have several serious security vulnerabilities in a voluntary audit. The vulnerabilities were quickly fixed, but the incident exemplifies the importance of external auditing of the open source projects on which we all depend.

2015 Cybersecurity Infographic: Attack Resiliency Challenges Industry Collaboration

January 4, 2017 No Comments

Infographic: Attackers are commandeering legitimate infrastructure and reaping millions in profit.

5 Ways to Secure Your Website from Hackers

January 2, 2017 No Comments

According to Sucuri, 1% of the world’s total websites are currently hacked or infected, which is approximately 9 million websites. It is therefore essential you take measures to ensure your website doesn’t succumb to a hack attack. Read our five top tips to help you keep your website safe and secure at all times.

Managing BYOD with DaaS (Desktop as a Service)

January 2, 2017 No Comments

Bring your own device or “BYOD” is gaining serious momentum. However, before we go any further, it’s important to establish what BYOD is. Essentially, it’s a business policy that enables employees to bring in personally owned endpoint devices (such as laptops, smartphones, tablets, etc.) and allows them to securely connect to company applications and access privileged business data. It also allows employees to remotely access this information from locations outside the office (anywhere, anytime, any device).

IT Briefcase Exclusive Interview: Evolving the Enterprise with the Service Desk and Improved Workflows through IT Service Management

December 26, 2016 No Comments

with Nancy Van Elsacker, Top DeskIn this Interview, Nancy Van Elsacker Louisnord, president of TOPdesk US, discusses the value of IT Service Management within the ever evolving IT Enterprise. Read More >>>

Private Practice: Encryption Exposed

December 22, 2016 No Comments

In September 2014, Apple made encryption default with the introduction of the iPhone 6. Then, in February 2016, a Los Angeles judge issued an order to Apple to help break into the encrypted iPhone belonging to a terrorist involved in a mass shooting. Apple had used some of the strongest encryption technologies and practices to protect its users and their data. The encryption technology did not discriminate between lawful and unlawful users. While there were many sides to this issue, it surfaced many important debates on security, privacy, and civil rights.

Protecting Your Site From Bad Bots

December 16, 2016 No Comments

Some people are surprised to learn that about half of the traffic on the web isn’t generated by human users. It’s generated by bots: software that trawls the web downloading and interacting with web pages much as humans do. Approximately a third of non-human web use is generated by “good bots”, bots that stick to the rules and perform useful services — search engine web crawlers like Googlebot fall into this category. The rest are bad bots, malicious software created and deployed by individuals and companies for nefarious purposes.

LabTech Integration – A Quick Training Guide for Enabling Trend Micro’s Integration With LabTech Platform

December 16, 2016 No Comments

Watch our short intro video to learn how our solution helps you manage Trend Micro security more e ectively.


December 16, 2016 No Comments

Download this white paper and learn about the three key must-haves in a smart security solution for your small business.

IT Security in the “Hands” of Robots?

December 14, 2016 No Comments

Security issues for IT managers are a primary concern. And the fact is, humans make mistakes. This is inevitable. But when it comes to IT security, these mistakes can be disastrous. Is it possible that these mistakes can be avoided by putting those traditionally manual tasks into the “hands” of robots? This idea that robots can ease security concerns and provide more time to operators for other activities and reduce OPEX is very appealing.

Hacking Highlights of 2016

December 12, 2016 No Comments

Ransomware everywhere: Ransomware attacks dominated headlines, reaching an epidemic level. In February, the Hollywood Presbyterian Hospital paid $17,000 in ransom money to regain access to files that had been encrypted. In the same month, Hospitals in Germany also fell victim to ransomware. In March, the Methodist Hospital in Henderson, Kentucky, declared an “internal state of emergency” after a ransomware attack encrypted all its files.

Protecting Information And Data During The Holiday Shopping Season

December 8, 2016 No Comments

At a time of year when we’re determined to bring glad tidings to all and we’d like to proclaim that it really is “a wonderful life,” we also have to acknowledge that there are a few bad Santas lurking among the nice elves out there. These holiday hackers and cyber-thieves are intent on their own version of merriment – and if they manage to penetrate your cyber defenses the result could be a lot worse than the traditional coal in the stocking.

10 Tips for Taming IT Tickets

December 8, 2016 No Comments

In many organizations, IT support seems to follow a corollary of Moore’s Law in which the number of support tickets — rather than the number of transistors — doubles every two years. Even companies that experience slower growth find that tickets ultimately proliferate and threaten to overwhelm their IT support teams if they haven’t kept their ticket management systems and processes up to date. You can avoid that fate by following the 10 steps below to keep tickets manageable, resolve them quickly and provide an amazing help desk and ticket management experience.

Data Erasure’s Role in Limiting Your Exposure to Cyber Attack

December 1, 2016 No Comments

Learn about the challenges of erasing SSDs, including how to overcome them using a certified data erasure process, which will both streamline processes and ensure regulatory compliance.

EU GDPR: A Corporate Dilemma

December 1, 2016 No Comments

Find out what IT professionals around the world are saying about their organizations’ level of awareness, preparation and capacity to meet the ‘right to be forgotten’ requirements and comply with the General Data Protection Regulation.

Integrating File Erasure with Active Directory

December 1, 2016 No Comments

Walk away with how you can properly manage and remove sensitive, but unneeded, files in live IT environments, by reading this whitepaper now.

Cloud and Data Center Erasure: Why Delete Doesn’t Suffice

December 1, 2016 No Comments

Learn how a certified data erasure solution will streamline internal processes and support regulatory compliance for mass storage hardware and configurations commonly found in data centers and cloud computing infrastructures.

Data Erasure’s Role in Limiting Your Exposure to Cyber Attacks

December 1, 2016 No Comments

Walk away with an understanding of the current landscape of cyber risks, how to prioritize data lifecycle management within your overall security objectives and how your organization can establish policies to reduce the impact of cyber hacks.

Empowering vSAN for Enterprise Storage

November 30, 2016 No Comments

Experts estimate that at least 2.5 quintillion bytes of data are produced every day. That’s an astronomical amount of data to be stored. One study revealed that managing storage growth is the dominant pain point for 79 percent of IT professionals. To help remedy this situation, VMware released its virtual SAN in March of 2014. Almost three years after its introduction, where is it now?

Edison Group: IBM FlashSystem:
Powering the Future of IT

November 28, 2016 No Comments

The direction of technology both follows and influences the direction of business. The tools enterprises need to compete, improve, adapt, solve problems, and succeed are supplied by technology. Sometimes, technology even supplies new opportunities, such as when a technological advance leads to the creation of a new marketplace. The Internet is by far the most powerful example of this in the past 50 years.

How Secure is Your Client Data?

November 22, 2016 No Comments

Most of us hand over confidential information to professionals without giving it a second thought. Your accountant probably knows all about your finances and your doctor has a comprehensive record of every illness you ever had. Would you want this information entering the public domain? Probably not. Luckily there are many ways to keep confidential data safe and secure. In this article, we are going to look at the most common ones.

Is Your Website Ready for Black Friday?

November 22, 2016 No Comments

When running an e-commerce website, downtime is the equivalent of locking your doors to the public. Not only are you not doing business, but you’re also actively pushing your customers into the arms of the competition. Amazon found that every 100 milliseconds of downtime cost them one percent in sales, and Google found that an extra .5 seconds in search page generation time dropped site traffic by 20 percent. Slow performance affects everything from individual transactions to customer retention, and ultimately revenue. E-commerce businesses simply cannot afford to suffer a slip in performance.

How to Keep Your Company Safe from the Threat of Ransomware

November 21, 2016 No Comments

Not long after its debut in 2009, The Good Wife earned a reputation as the most tech-savvy show on television. Twitter, Anonymous, and Bitcoin are all featured prominently in legal cases tackled by the show’s lawyers. It’s one of the few TV shows to portray the very real problem of ransomware. In a 2014 episode, Russian cyberextortionists encrypt all the files on the computer system of a law firm. The extortionists tell the firm that if they don’t receive a $50,000 ransom within 72 hours, all the data will be destroyed.


UC Expo" width="250" height="250" alt="UC Expo">



ITBriefcase Comparison Report