Inside the Briefcase

Briefcase Highlights


Security Considerations for Intelligent WAN (IWAN)

February 20, 2017 No Comments

Lower cost Internet connections have become more reliable and cost less than dedicated links. Cisco® Intelligent WAN (IWAN) solution gives you a way to take advantage of cheaper bandwidth at branch locations, without compromising application performance, availability, or security.

5 Trends And Factors That Continue To Impact Cyber Security In 2017

February 20, 2017 No Comments

It’s become news that’s not unexpected any more. We awaken to learn that yet another national retailer has been hacked and once again credit-card information for millions of customers is at risk. Yet, despite all the publicity these security breaches receive and all the warning consumers hear, cyber criminals still achieve success and seem more brazen than ever.

Ignoring DNS Security Carries Serious Consequences for Business

February 8, 2017 No Comments

At the end of last year, executives around the globe sat around boardrooms finalizing budgets and prioritizing IT investments. Without a doubt cybersecurity was at the top of every business’ agenda. But, as we move into 2017, the risk is only growing and organizations need to ask themselves: do they really know where the danger lies and furthermore, are they doing the right thing to protect themselves from cyberattacks?

Understanding 2017′s Top Cloud Security Risks and How to Protect Your Data

February 2, 2017 No Comments

As the cloud becomes a more popular medium for individuals and businesses alike, many people are searching for new ways to break through cloud security and acquire more information. In order to ensure that you and your data are protected, you must understand the security risks and implement methods to protect your data that is stored in the cloud. Since over 70 percent of businesses operate in the cloud, it is more important than ever for those businesses and their customers to take the necessary precautions to protect and backup cloud data.

Outstanding Tips for Protecting the Online Accounts Using Secure Strong Password

January 30, 2017 No Comments

Most people are using the social media sites and other sites regularly to get updated information. In fact, each of them should require a strong password which is meant for protection purpose. Having a secure and unique password for each online account is critically a necessary one forever. It begins to access your account quickly by entering the secure password in it. This is the positive step for accessing the account by having a password for your account.

From Weaponized Homes to new DevSecOps Jobs: Security Trends for 2017

January 30, 2017 No Comments

As we ring in the new year for 2017, there’s plenty of uncertainty surrounding the security and privacy of our digital world. Much of this uncertainty stems from escalating intensity of cyber attacks against consumers and businesses and the evolution of the “Internet of Things” as a weaponized battlefield. As the year comes to a close and we consider what impacted the security industry in 2016, I’ve put some thought into my own perspectives as to what 2017 might hold, find my predictions for 2017 below.

A Guide to 12 CyberSecurity Metrics You/Your Vendors Should be Watching

January 24, 2017 No Comments

How can you better understand your actual cybersecurity standings and health? The first step is to better understand the three primary ways that your organization can experience a cybersecurity incident: insider threat, outsider threat and attacks through a supply chain.

Making Risk Management More Effective with Security Ratings

January 24, 2017 No Comments

With the growth of cyber threats and the daily reports of security breaches, cyber risk has to be high on your list of priorities for your enterprise. According to Lloyds Risk Index 20131 cyber risk is now the third biggest concern of CEOs and their senior executives, following high taxation and loss of customers.

Critical Third Parties: Exploring Data Security in the Legal Sector and Beyond

January 24, 2017 No Comments

Download this report now to discover the current state of the data security landscape in the Legal sector and learn how organizations can improve their own cybersecurity programs and vendor risk management techniques.

Three Reality Checks for Compliance and Risk Management in 2017

January 23, 2017 No Comments

As the transition to a new Presidential administration unfolds, uncertainty abounds. Predictions made about the regulatory landscape made before November may not ring as true, as Republicans look to make good on promises about smaller government and regulatory reform, particularly in banking and finance. Likewise, the potential repeal of the Affordable Care Act and significant changes to Medicare will make waves in healthcare regulation.

Privacy Goes Mainstream in 2017

January 20, 2017 No Comments

As we head in to 2017, it has become increasingly clear that privacy and security concerns have completed their jump from the board room to the living room. With citizen privacy protection being discussed more regularly, distrust is running rampant and complete security protection is no longer assumed by anyone. These changing assumptions were demonstrated just recently when the US Executive Order 12333 was put into place by departing President Obama to expand the power of the NSA to share globally intercepted personal communications with 16 other intelligence agencies before applying privacy protection

DDoS Attacks Are A Growing Risk For All Online Service Providers

January 19, 2017 No Comments

In October, a massive distributed denial of service attack seriously degraded the service of one of web’s major infrastructure providers. The web depends on DNS, and if one the big DNS providers is in trouble, that spells a bad day for the rest of the web. In this case, Twitter, Reddit, and hundreds of smaller sites and web applications were disrupted.

Two Pronged-Approach for Defending Against Ransomware Attacks

January 18, 2017 No Comments

Ransomware in IT healthcare environments continues to be an unholy menace to the day-to-day operations of hospitals. I’ve spoken with healthcare groups not just in the UK, but around the world, who have been hit at very large scales, effectively suspending all frontline digital operations in healthcare environments. It’s terrifying to consider the potential real-world physical impacts to patients when doctors and nurses are all of a sudden unable to review charts or tests in order to provide urgent care.

IDC ExpertROI® SPOTLIGHT: Symantec Delivering on Its Strategic Vision with Next-Generation Secure Datacenter Powered by Cisco ACI

January 17, 2017 No Comments

Read more to learn how Symantec delivers on its strategic vision with Next-Generation Secure Datacenter powered by Cisco ACI.

IDC Solution Brief – Assessing the Business Value of SDN Datacenter Security Solutions

January 17, 2017 No Comments

Download this paper to learn how Cisco’s ACI platform uses a policy-based automation solution to provide greater scalability, a greater network and an improvement in IT alignment with business objectives. 

The Security Problem with IT Sprawl

January 16, 2017 No Comments

Tweet Featured article by Rick DelGado, Independent Technology Author With new developments in technology, companies are desperate to stay ahead of their competitors and keep up with the higher expectations consumers are adopting. There are only so many resources to leverage, so many have decentralized their IT infrastructure, according to a VMware survey that discovered […]

Tips to Minimize the Impact of a Security Breach

January 13, 2017 No Comments

The SecureWorks Incident Management and Response team developed the following recommendations to help IT and IT security organizations minimize the duration and impact of a security breach.

Security and Risk Consulting: The Value of Penetration Testing

January 13, 2017 No Comments

The threat posed by hackers is persistent, and it is important to maintain a strong defense to protect your organization. Using real-world testing on your network determines areas where you may be vulnerable.

Five Critical Rules for Firewall Management: Lessons from the Field

January 13, 2017 No Comments

Firewall management remains an organization’s primary network defense. And it’s easy for security managers to get wrong. Download this white paper and learn lessons from the field.

Avoiding IT System Breakdowns

January 11, 2017 No Comments

With the holiday season behind us, e-commerce and retail companies are recovering from the accelerated pace of their peak season. The National Retail Federation found that more than 154 million consumers shopped or planned to go shopping over the Thanksgiving weekend alone. Out of this number, around 40 percent shopped in-store. With this type of traffic, retail companies need to know that their systems will be able to handle high traffic loads.

Cisco Annual Security Report 2016

January 9, 2017 No Comments

Learn how to become more resilient to new attacks and compete more safely in the digital age with the Cisco 2016 Annual Security Report.

Emerging Fire Protection Technologies to Watch

January 9, 2017 No Comments

Fire hazard is no joke, and everybody knows that. Humans dread fire for a reason – it destroys everything in its path. Although the fire did not evolve, the technologies that we use to fight it did. These improvements in the fire protection field now make it easier to detect, suppress and extinguish fires. Every step we make with these improvements is a step towards saving lives. Here are some of the newest technologies in the firefighting field.

The Necessity Of Security Audits For Open Source Projects

January 5, 2017 No Comments

Curl, an open source application installed on hundreds of thousands of servers, was found to have several serious security vulnerabilities in a voluntary audit. The vulnerabilities were quickly fixed, but the incident exemplifies the importance of external auditing of the open source projects on which we all depend.

2015 Cybersecurity Infographic: Attack Resiliency Challenges Industry Collaboration

January 4, 2017 No Comments

Infographic: Attackers are commandeering legitimate infrastructure and reaping millions in profit.

5 Ways to Secure Your Website from Hackers

January 2, 2017 No Comments

According to Sucuri, 1% of the world’s total websites are currently hacked or infected, which is approximately 9 million websites. It is therefore essential you take measures to ensure your website doesn’t succumb to a hack attack. Read our five top tips to help you keep your website safe and secure at all times.

Managing BYOD with DaaS (Desktop as a Service)

January 2, 2017 No Comments

Bring your own device or “BYOD” is gaining serious momentum. However, before we go any further, it’s important to establish what BYOD is. Essentially, it’s a business policy that enables employees to bring in personally owned endpoint devices (such as laptops, smartphones, tablets, etc.) and allows them to securely connect to company applications and access privileged business data. It also allows employees to remotely access this information from locations outside the office (anywhere, anytime, any device).

IT Briefcase Exclusive Interview: Evolving the Enterprise with the Service Desk and Improved Workflows through IT Service Management

December 26, 2016 No Comments

with Nancy Van Elsacker, Top DeskIn this Interview, Nancy Van Elsacker Louisnord, president of TOPdesk US, discusses the value of IT Service Management within the ever evolving IT Enterprise. Read More >>>

Private Practice: Encryption Exposed

December 22, 2016 No Comments

In September 2014, Apple made encryption default with the introduction of the iPhone 6. Then, in February 2016, a Los Angeles judge issued an order to Apple to help break into the encrypted iPhone belonging to a terrorist involved in a mass shooting. Apple had used some of the strongest encryption technologies and practices to protect its users and their data. The encryption technology did not discriminate between lawful and unlawful users. While there were many sides to this issue, it surfaced many important debates on security, privacy, and civil rights.

Protecting Your Site From Bad Bots

December 16, 2016 No Comments

Some people are surprised to learn that about half of the traffic on the web isn’t generated by human users. It’s generated by bots: software that trawls the web downloading and interacting with web pages much as humans do. Approximately a third of non-human web use is generated by “good bots”, bots that stick to the rules and perform useful services — search engine web crawlers like Googlebot fall into this category. The rest are bad bots, malicious software created and deployed by individuals and companies for nefarious purposes.

LabTech Integration – A Quick Training Guide for Enabling Trend Micro’s Integration With LabTech Platform

December 16, 2016 No Comments

Watch our short intro video to learn how our solution helps you manage Trend Micro security more e ectively.


UC Expo" width="250" height="250" alt="UC Expo">



ITBriefcase Comparison Report