January 13, 2017
Firewall management remains an organization’s primary network defense. And it’s easy for security managers to get wrong. Download this white paper and learn lessons from the field.
January 11, 2017
With the holiday season behind us, e-commerce and retail companies are recovering from the accelerated pace of their peak season. The National Retail Federation found that more than 154 million consumers shopped or planned to go shopping over the Thanksgiving weekend alone. Out of this number, around 40 percent shopped in-store. With this type of traffic, retail companies need to know that their systems will be able to handle high traffic loads.
January 9, 2017
Learn how to become more resilient to new attacks and compete more safely in the digital age with the Cisco 2016 Annual Security Report.
January 9, 2017
Fire hazard is no joke, and everybody knows that. Humans dread fire for a reason – it destroys everything in its path. Although the fire did not evolve, the technologies that we use to fight it did. These improvements in the fire protection field now make it easier to detect, suppress and extinguish fires. Every step we make with these improvements is a step towards saving lives. Here are some of the newest technologies in the firefighting field.
January 5, 2017
Curl, an open source application installed on hundreds of thousands of servers, was found to have several serious security vulnerabilities in a voluntary audit. The vulnerabilities were quickly fixed, but the incident exemplifies the importance of external auditing of the open source projects on which we all depend.
January 4, 2017
Infographic: Attackers are commandeering legitimate infrastructure and reaping millions in profit.
January 2, 2017
According to Sucuri, 1% of the world’s total websites are currently hacked or infected, which is approximately 9 million websites. It is therefore essential you take measures to ensure your website doesn’t succumb to a hack attack. Read our five top tips to help you keep your website safe and secure at all times.
January 2, 2017
Bring your own device or “BYOD” is gaining serious momentum. However, before we go any further, it’s important to establish what BYOD is. Essentially, it’s a business policy that enables employees to bring in personally owned endpoint devices (such as laptops, smartphones, tablets, etc.) and allows them to securely connect to company applications and access privileged business data. It also allows employees to remotely access this information from locations outside the office (anywhere, anytime, any device).
December 26, 2016
with Nancy Van Elsacker, Top DeskIn this Interview, Nancy Van Elsacker Louisnord, president of TOPdesk US, discusses the value of IT Service Management within the ever evolving IT Enterprise. Read More >>>
December 22, 2016
In September 2014, Apple made encryption default with the introduction of the iPhone 6. Then, in February 2016, a Los Angeles judge issued an order to Apple to help break into the encrypted iPhone belonging to a terrorist involved in a mass shooting. Apple had used some of the strongest encryption technologies and practices to protect its users and their data. The encryption technology did not discriminate between lawful and unlawful users. While there were many sides to this issue, it surfaced many important debates on security, privacy, and civil rights.
December 16, 2016
Some people are surprised to learn that about half of the traffic on the web isn’t generated by human users. It’s generated by bots: software that trawls the web downloading and interacting with web pages much as humans do. Approximately a third of non-human web use is generated by “good bots”, bots that stick to the rules and perform useful services — search engine web crawlers like Googlebot fall into this category. The rest are bad bots, malicious software created and deployed by individuals and companies for nefarious purposes.
December 16, 2016
Watch our short intro video to learn how our solution helps you manage Trend Micro security more e ectively.
December 16, 2016
Download this white paper and learn about the three key must-haves in a smart security solution for your small business.
December 14, 2016
Security issues for IT managers are a primary concern. And the fact is, humans make mistakes. This is inevitable. But when it comes to IT security, these mistakes can be disastrous. Is it possible that these mistakes can be avoided by putting those traditionally manual tasks into the “hands” of robots? This idea that robots can ease security concerns and provide more time to operators for other activities and reduce OPEX is very appealing.
December 12, 2016
Ransomware everywhere: Ransomware attacks dominated headlines, reaching an epidemic level. In February, the Hollywood Presbyterian Hospital paid $17,000 in ransom money to regain access to files that had been encrypted. In the same month, Hospitals in Germany also fell victim to ransomware. In March, the Methodist Hospital in Henderson, Kentucky, declared an “internal state of emergency” after a ransomware attack encrypted all its files.
December 8, 2016
At a time of year when we’re determined to bring glad tidings to all and we’d like to proclaim that it really is “a wonderful life,” we also have to acknowledge that there are a few bad Santas lurking among the nice elves out there. These holiday hackers and cyber-thieves are intent on their own version of merriment – and if they manage to penetrate your cyber defenses the result could be a lot worse than the traditional coal in the stocking.
December 8, 2016
In many organizations, IT support seems to follow a corollary of Moore’s Law in which the number of support tickets — rather than the number of transistors — doubles every two years. Even companies that experience slower growth find that tickets ultimately proliferate and threaten to overwhelm their IT support teams if they haven’t kept their ticket management systems and processes up to date. You can avoid that fate by following the 10 steps below to keep tickets manageable, resolve them quickly and provide an amazing help desk and ticket management experience.
December 1, 2016
Learn about the challenges of erasing SSDs, including how to overcome them using a certified data erasure process, which will both streamline processes and ensure regulatory compliance.
December 1, 2016
Find out what IT professionals around the world are saying about their organizations’ level of awareness, preparation and capacity to meet the ‘right to be forgotten’ requirements and comply with the General Data Protection Regulation.
December 1, 2016
Walk away with how you can properly manage and remove sensitive, but unneeded, files in live IT environments, by reading this whitepaper now.
December 1, 2016
Learn how a certified data erasure solution will streamline internal processes and support regulatory compliance for mass storage hardware and configurations commonly found in data centers and cloud computing infrastructures.
December 1, 2016
Walk away with an understanding of the current landscape of cyber risks, how to prioritize data lifecycle management within your overall security objectives and how your organization can establish policies to reduce the impact of cyber hacks.
November 30, 2016
Experts estimate that at least 2.5 quintillion bytes of data are produced every day. That’s an astronomical amount of data to be stored. One study revealed that managing storage growth is the dominant pain point for 79 percent of IT professionals. To help remedy this situation, VMware released its virtual SAN in March of 2014. Almost three years after its introduction, where is it now?
November 28, 2016
The direction of technology both follows and influences the direction of business. The tools enterprises need to compete, improve, adapt, solve problems, and succeed are supplied by technology. Sometimes, technology even supplies new opportunities, such as when a technological advance leads to the creation of a new marketplace. The Internet is by far the most powerful example of this in the past 50 years.
November 22, 2016
Most of us hand over confidential information to professionals without giving it a second thought. Your accountant probably knows all about your finances and your doctor has a comprehensive record of every illness you ever had. Would you want this information entering the public domain? Probably not. Luckily there are many ways to keep confidential data safe and secure. In this article, we are going to look at the most common ones.
November 22, 2016
When running an e-commerce website, downtime is the equivalent of locking your doors to the public. Not only are you not doing business, but you’re also actively pushing your customers into the arms of the competition. Amazon found that every 100 milliseconds of downtime cost them one percent in sales, and Google found that an extra .5 seconds in search page generation time dropped site traffic by 20 percent. Slow performance affects everything from individual transactions to customer retention, and ultimately revenue. E-commerce businesses simply cannot afford to suffer a slip in performance.
November 21, 2016
Not long after its debut in 2009, The Good Wife earned a reputation as the most tech-savvy show on television. Twitter, Anonymous, and Bitcoin are all featured prominently in legal cases tackled by the show’s lawyers. It’s one of the few TV shows to portray the very real problem of ransomware. In a 2014 episode, Russian cyberextortionists encrypt all the files on the computer system of a law firm. The extortionists tell the firm that if they don’t receive a $50,000 ransom within 72 hours, all the data will be destroyed.
November 21, 2016
Cyber criminals are increasingly targeting companies around the world, and the healthcare industry is no exception. With databases of private health data full of personal information, a hospital system with anything from lists of BLS certification to transplant waiting lists is a treasure trove for malicious hackers and spyware. We’ve seen multiple examples lately of what can happen when hackers take over, potentially costing healthcare organizations thousands of dollars and leading to the release of thousands or millions of pieces of confidential information.
November 21, 2016
In Forrester’s 25-criteria evaluation of endpoint security suite providers, they identified the 15 most significant ones nd researched, analyzed, and scored them.
November 17, 2016
In our digital-first world, the need for proper securing and storage of personally identifiable information (PII) is becoming increasingly acute. The last three major data breaches of 2016 alone affected a breathtaking 611 million user accounts. Information stolen included user IDs, passwords, e-mail addresses, full users’ names, dates of birth, telephone numbers, IP information and, in some cases, security questions and answers.