Inside the Briefcase






Briefcase Highlights


DATA SECURITY

The Secret to Growing Your Business in 2018: Ecommerce

January 16, 2018 No Comments

If you’re a small business owner and you can’t seem to figure out where or how to increase your revenue, you’re not alone. Tons of small business owners are in the same boat as you. The good news: there’s a solution. And not only is this solution available, it’s incredibly efficient and any small business can take advantage. It’s called ecommerce. You’ve heard of it. It’s everywhere.

IT Briefcase Exclusive Interview: Overcoming the Business, Regulatory and Legal Risks Introduced By Social Media and Cloud-Based Collaboration Platforms

January 16, 2018 No Comments

The use of social media and cloud-based collaboration platforms has proliferated many, if not most, business environments. While the benefits are well documented, there are also significant business, legal and regulatory risks introduced. But these risks can be mitigated. I had the opportunity to sit down recently with Bill Tolson, Vice President of Marketing for Archive360 (www.archive360.com) to discuss this important topic.

How GDPR Can Help Against Phishing Scams

December 21, 2017 No Comments

There are no letters more on IT and business professional’s lips at the moment than GDPR. The General Data Protection Regulation comes into force in May 2018, giving businesses the first half of the year to ensure they are compliant across the board. Companies could foot landmark fines for mishandling sensitive data, which accounted for a rise in cybercrime since 2015. While the general public won’t notice too much difference, there could be an unexpected benefit in the new data laws: the stopping of phishing scams.

Free Techniques to Increase Your Online Security

December 19, 2017 No Comments

Are you worried your computer/device isn’t as well protected as it should be? Maybe you’ve recently encountered several security issues and now you’re looking for more information on how to protect yourself properly. As the internet keeps growing on a daily basis, so are the risks involved when simply surfing the net. Therefore, it’s crucial you do everything you can to secure your computer and your identity with it. Here are a few helpful tips to add a few extra layers of security to your devices.

IT Briefcase Exclusive Interview: Security Paradigms Shift from Prevention to Incident Response

December 19, 2017 No Comments

with Bob Noel, PlixerThere have been 3,833 publicly disclosed data breaches in the first nine months of 2017, exposing more than seven billion records which is causing harm to more than half the individuals in the US* that are now in danger of identity theft. This interview discusses IT Security trends and paradigm shifts to be aware of in 2018. Read More >>>

Webcast: Hybrid Networks, Securing Digital Transformation, by Computing

December 18, 2017 No Comments

This webinar examines hybrid networks and investigates the best way to balance performance and security to create a viable path to digital transformation.

IT Briefcase Exclusive Interview: Challenges and Successes in Maximizing Computing Infrastructure Investments

December 15, 2017 No Comments

with Mark Gaydos, Nlyte SoftwareThis interview offers insight into how the leading organizations utilize technology to reduce costs while tackling high business demands by sharing real-world successes, challenges and best practices. Read More >>>

Securing Hybrid Networks for Dummies

December 15, 2017 No Comments

In our latest e-book, “Securing Hybrid Networks for Dummies,” you’ll discover how to manage and sustain complex hybrid network infrastructures with ease with next generation firewalls. Read the e-book now.

A Guide on Using the Cloud Safely

December 12, 2017 No Comments

Any small or large business using cloud computing must ensure their files are as secure as possible, which will help companies to protect their data while enjoying the benefits that come with migrating to the cloud. To prevent your files from falling into the wrong hands, read the following informative guide on using the cloud safely.

Booters on Demand: When Too Much of a Good Thing is Actually Horrible

December 11, 2017 No Comments

As Nancy Sinatra explained, boots are made for walking. Booters, on the other hand, are made for stomping websites right off the Internet. Isn’t it strange that you’re able to purchase both footwear and cyberattacks from your smartphone today? Since booters are essentially Distributed Denial of Service (DDoS) attack services for hire, it’s a good idea to recap just what a DDoS attack is.

Securing the Digital Dream: The need for SD-WAN security to be included as fundamental consideration of digital transformation plans

December 6, 2017 No Comments

The latest Computing Research whitepaper, looks at the research and benefits of using hybrid networks / SD-WANs to help facilitate digital transformation as well as some of the issues associated with this approach.

Tips For Getting Your Ideas Heard When Working With Leadership

December 4, 2017 No Comments

Being an IT professional has its challenges in the field. While you’re smart, talented and have a lot of knowledge, not everyone at your company is going to recognize this right away. IT is like speaking another language for a lot of people, including staff and leadership in your office.

The Promise of Industry 4.0: Why Companies Should Prepare for the Future of Smart Production

December 1, 2017 No Comments

Industrial Internet of Things (IIoT) has the potential to revolutionize manufacturing, commerce, and even healthcare. Think smarter, more efficient factories. Supply chains and distribution networks revolutionized by real-time location data. Imagine more fault-tolerant systems for producing products, food, and power. This is the promise of Industry 4.0, and the transformation is already underway.

Automating Active Directory Cleanup

November 29, 2017 No Comments

Managing Active Directory isn’t rocket science. Of course, there are difficult parts, but most of the time it’s about getting the basics right and following straightforward routines. If you keep things organized and do all the simple things on time, you have 90% of success. But if you don’t, you won’t get far, no matter how complex and sophisticated your toolbox is.

How Biometrics Can Benefit User Privacy

November 28, 2017 No Comments

Living in the digital age means that most of our assets have crossed over from the real world and into the digital domain, including out personal information. One of the main issues e-commerce and online business owners face is trying to keep that information private and secure and all it takes is a single hack, fraud, or some other breach of security for customers to lose their trust in a specific brand and abandon it for some of the other, more secure alternatives.

Secure Workspaces: Enhancing Physical Security around BYOD

November 28, 2017 No Comments

New data breaches hit companies and organizations of all sizes, in all industries just about every day. And, while it’s much harder to hack into a corporate database, the proliferation of BYOD policies and mobile workers have sadly increased the amount of breaches caused by stolen devices. While the latter isn’t high up on the “massive” breach scale, breaches caused by stolen devices are still very much a real threat.

Cyber Security – 4 Things to Do to Improve Computer Cyber Security and Prevent Cyber Crime Attacks

November 20, 2017 No Comments

In this article, you will learn to avoid all the silly mistakes most computer owners make and expose their computers and personal information open to cyber attacks. You’ll also discover why it is essential to change your passwords frequently and have up-to-date firewall and antivirus program.

7 New Tech Devices Of 2017 Worth Mentioning

November 17, 2017 No Comments

The Consumer Electronics Show in Las Vegas has finally come to a close and we have rounded up some of the best devices, which were on display. Consumers would definitely have been amazed by a large number of electronics, which had been displayed. We have selected for you 7 of the devices which we feel are worth mentioning.

7 Tips to Boost a Slow Computer

November 15, 2017 No Comments

Is your computer slower than a sloth? Do you spend more time staring at the ceiling than your monitor? When you first bought your computer, it probably ran like a dream. But over time, as you fill it with games, apps, and photos, these files take up space on your hard drive. The result? Your computer runs slower — and you get more frustrated. Before you give up and toss it out the window, try these seven easy tips for speeding up your slow computer.

IT Briefcase Exclusive Interview: The Cloud Security Skills Crisis

November 14, 2017 No Comments

It’s no secret that a security skills gap is hindering cloud adoption. In fact, 49 percent of companies are delaying cloud deployment because of this issue. Enterprises of all sizes are under mounting pressure to cultivate the necessary cloud security skills for migration. That said, how can organizations safely get to the cloud before it’s too late? Srini Vemula, global product management leader of SenecaGlobal, shares more on how companies can minimize risks brought on by a lack of cloud security and address the growing skills gap.

How to Determine If Your Security Systems Are Working

November 13, 2017 No Comments

How well are your company’s security systems working? In our closely-connected world, it can be hard to tell if your data is fully protected from hackers, scammers and others who would want to use it for nefarious purposes. We’ve all seen what can happen when people’s sensitive information is compromised: customers and clients panic, companies scramble to reassure those who are affected and to remedy the situation and security teams start thinking about what they could have done to prevent a breach in the first place.

Transitioning to Digital: Steps to Make Your Online Debut

November 9, 2017 No Comments

The potential of the Internet is limitless, and it’s changing every day. If your small business isn’t already online, it should be. Not only can having an online presence increase your sales, but it could also increase your reputation and credibility. Today, consumers need to trust a store before they buy from it, especially if it’s online and they can’t see the physical object for themselves. To make the transition to digital, however, you need to do it right.

5 New Technoligies You Should Embrace in Your Business

November 9, 2017 No Comments

Increased productivity does more than just get projects executed seamlessly. It helps a lot in cutting costs and saving a lot of quality time which improves the overall ROI. With the ever changing technology trends in the business sector, if you don’t embrace new technologies as soon as they emerge, you might find yourself playing a very tricky game of catch-up in order to stay ahead of the curve and be relevant in your sector. Currently, even smaller players or small business owners have also started maneuvering quickly in order to take advantage of newer technologies whenever they emerge unlike it was in the recent past.

IT Briefcase Exclusive Interview: Getting Into Google’s Buganizer

November 8, 2017 No Comments

Security researcher Alex Birsan was able to gain access to some of Google’s most critical and dangerous vulnerabilities by finding and exploiting a series of flaws in the company’s internal bug tracker called Google Issue Tracker or “Buganizer.” By spoofing a Google corporate email address, he was able to gain access to the back-end of the system and thousands of bug reports, including those marked as “priority zero,” vulnerabilities which are the most severe and dangerous and enable the greatest amount of damage.

The Human Side of Cybersecurity: An Exclusive Q&A with Southeastern Grocers CISO Chris Gay

November 6, 2017 No Comments

Chris Gay, VP and Chief Information Security Officer of Southeastern Grocers and advocate for cybersecurity education, will be leading a roundtable discussion on the topic at the upcoming Cyber Security Exchange in Amelia Island, Florida, this December 4-6. Ahead of the Exchange, we sat down with him to talk cybersecurity education and awareness, challenges to CISOs at large companies, mitigating risks associated with new technology and more.

Top 4 Ways to Protect Yourself Online

October 30, 2017 No Comments

With 72% of British consumers being concerned about how secure their data is online, many businesses are taking action to step up and evaluate their current security measures. However, there is still plenty you can be doing yourself to ensure your own safety and privacy while on the web.

How Facial Recognition is Expanding into the Mainstream

October 25, 2017 No Comments

In 2002, law enforcement officials in New Orleans attempted to bring facial recognition to the public’s eye for the first time. It failed spectacularly. The technology was supposed to be used to during the Super Bowl to detect wanted criminals from among the crowds gathered to watch the game or partake in festivities at the stadium. But facial recognition software of the time proved to be ineffective in crowds and provided too many false positives, and the attempt was considered a failure and met with severe backlash.

4 Steps Your Company Can Take to Improve IT Security

October 25, 2017 No Comments

We live in an era now where basic virus protection software isn’t going to cut it in terms of protecting your IT infrastructure. Many other problems can now arise and it isn’t just cyber-attacks we need to be wary of – it’s also physical access to our computers and servers. If you’re looking to step up your game and secure your IT practices, consider following the below steps.

How to Securely Dispose of Company Data

October 20, 2017 No Comments

Disposing of company data is something that has to happen for several reasons, for example, when hardware hits the end of its lifespan and needs to be replaced. Another reason for data disposal is if a company is trying to merge and condense their data into easier manageable solutions. There are many reasons why it needs to happen but, most importantly, when it does need to happen, it needs to happen with security in mind.

Questions to Ask on Infrastructure for Your Windows 10 Deployment

October 19, 2017 No Comments

Delivering Windows 10 deployment data of 30GB+ over a company WAN reminds me of my brief life as a PC gamer back in the 1990s (ancient tech, 386 and MS-DOS). I became obsessed with a game called Wing Commander. I flew a fighter through space — slowing down to navigate asteroid fields and tangling with enemy fighters — to help get the mother ship safely to its destination before it was too late.

ADVERTISEMENT

DTX ExCeL London

WomeninTech