<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=446209&amp;fmt=gif">

Greg LaBrie

Greg LaBrie has more than 20 years of network architecture and engineering experience designing networks that exceed technical requirements, improve operational proficiency and reduce total costs of ownership. Greg holds a number of technical certifications for HPE, Cisco, Fortinet, and much more.
Find me on :

Posts by Greg LaBrie

3 Questions to Ask When Choosing a Cloud Service Provider

By Greg LaBrie |   Mar 29, 2016

Cloud service providers come in all shapes and sizes, and have a wide variety of offerings that your business can choose from. Picking a cloud service provider is not something that should be taken lightly, as they will have access to your company’s sensitive information and resources. Before you sign a cloud agreement, be sure to ask these three questions.

The Importance of Data Encryption

By Greg LaBrie |   Mar 22, 2016

Is your business utilizing data encryption in your security strategy? The process of changing information to make it unreadable to those except authorized users can help your company securely protect data and safeguard it from potential threats. [click to tweet] Businesses use data encryption to protect personal information, customer data, trade secrets, employee files, tax information, credit card numbers and more. This benefits the network is breached. Read on to learn about the benefits of data encryption.

3 Common Cloud Security Mistakes

By Greg LaBrie |   Mar 15, 2016

Not long ago, many organizations were reluctant to adopt cloud technologies mostly due to concerns about security and loss of data control. After all, the traditional approach to network security is heavily focused on protecting the network perimeter. How do you do that when the Internet is being used to interact with applications, services, and data? It’s no surprise that enterprises were a bit unsettled with the idea of sharing the responsibility of security and privacy with cloud providers.

3 Information Security Trends Every Company Should Know

By Greg LaBrie |   Mar 08, 2016

The technology industry is rapidly evolving, changing and growing; it’s important to stay up to date on current trends, and even brush up on skills well in advance of needing them, so you are prepared when emerging and disruptive technologies sweep the industry. Read on for three information security trends to be aware of in 2016 so your company can best prepare against potential hackers and cyber criminals.

Corporate Sustainability through Green Initiatives

By Greg LaBrie |   Mar 01, 2016

From alternative energy to stocking post-consumer recycled content in the office, we pride ourselves on leading the IT industry in corporate sustainability and an eco-friendly mindset. We recently rolled out WEI StepsUP, our environmental initiative which helps to reduce emissions, pollutants and our overall carbon footprint. Here are the green initiatives we are working on to reduce our impact on the world around us.

Importance of Security and Threat Prevention Assessments

By Greg LaBrie |   Feb 25, 2016

IT leaders have worked hard to keep their networks safe. With the right systems, solutions and policies in place, the concern about data security should diminish, right? Not exactly. Plenty of companies have gone above and beyond to secure their networks, although it seems that a breach is inevitable given that so many major corporations and brands have been compromised in the past few years. Hackers continue to evolve and so must a company’s security strategy.

 

Ransomware Hits Enterprises

By Greg LaBrie |   Feb 23, 2016

Newscasters seemed rattled by the news last week that Hollywood Presbyterian Medical Center paid hackers $17,000 in Bitcoin to regain access to a key system.

This is no surprise for security insiders. Ransomware for enterprises is a top trending threat. In fact, the center’s ransom pales in comparison to the $123,000 in Bitcoin demanded from a New Jersey school district in 2015; the district decided instead to rebuild systems from backups.

Security analysts say that anywhere from 3 to 40 percent of ransomware victims pay up. The FBI, the agency responsible for investigating ransomware, has no way to help. Instead, the FBI recommends paying the ransom if the victim has no unaffected backup from which to restore files. Several police departments have paid ransoms.

Beefing Up Security with Anti-Malware Defenses

By Greg LaBrie |   Feb 18, 2016

 

If your organization is attacked by malware, can you afford it? The repercussions are huge – money, reputation, productivity and the confidence in moving forward are all compromised. There may also be legal implications, and losses that cannot be monetized. How does an organization protect itself from malware and the growing efforts of cybercriminals?

2016 IT Channel Insight: IT Priorities and More

By Greg LaBrie |   Feb 16, 2016

The IT channel outlook for 2016 is filled with mixed opinions. While it is expected to be one of the best years for IT, it is also slated to be one of the worst. Our Senior Director of Marketing and Product Management, Jennifer Burl, recently spoke with Michael Vizard at Channel Insider to share some insight and provide details into how IT organizations are thinking about the year ahead.

Do Your Security Solutions Work as a Team?

By Greg LaBrie |   Feb 11, 2016

Every organizational leader knows the value of teamwork. When the various parts of your team work together, they can get more done with less, meet seemingly impossible goals, and stand up to enormous obstacles. What you might not realize as an IT leader is that your security solutions can deliver the same results if they also work as a team. While you don’t have to coach programs and hardware as you would a human team, you do have to choose solutions wisely and integrate them in a way that maximizes efficiency and effectiveness.

About WEI

WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.

Subscribe to WEI's Tech Exchange Blog


Categories

see all
Contact Us