When was the last time you gave your storage solutions an in-depth and thorough review? Whichever enterprise storage solution you use for your organization, it’s important to make sure that the brain of your operations is working smoothly and data is flowing where it’s needed, when it’s needed.
Posts by Michael Thweatt
If a disaster were to hit your enterprise, would your data be protected? This information is the backbone of your organization so hopefully the answer to the questions is yes. However, if your disaster recovery plan is not what you would like it to be, or if it’s missing all together, it’s not too late to protect your data in the event of disaster.
Apple is one of the greatest comeback success stories for technology. Since the mid-1980s, the Mac computer grew from owning only five-percent of the computer market to dominating it today. While loyal Apple users demand the ability to use their devices in the workplace, enterprises and IT have pushed back since their products are expensive and not easily adaptable to the enterprise mobility setting. As Apple grows and continues to dominate the market, IT is shifting its thoughts on the use of these products and devices in the organization.
Mobile applications and devices are seeping into every aspect of our personal and professional lives. To keep up with the changing times and the demands of consumers and employees, it’s important for enterprises to leverage the mobility trend to their advantage.
When discussing hybrid solutions and digital transformation, there is often some confusion between Hybrid IT and Hybrid Cloud. While there are certain striking similarities, it is critical to understand that there are also very important differences between the two and how enterprises use them within their organization.
Digital-ready networks represent the future of enterprise growth and innovation with the use of technologies such as cloud, Internet of Things (IoT), mobile, social, and big data and analytics. But there is more to being digital-ready than just using these technologies; it requires your enterprise to view it as an essential business strategy for success.
Ransomware was a top concern for enterprises around the world in 2017 and continues to be one moving forward. Organizations around the globe are increasingly dependent on technology to help reach business goals, but it comes with risk. Cybercriminals are masters at exploiting technological weak spots to hit companies where it hurts the most.
It feels like every time we turn around there is a new cybersecurity threat to report that organizations need to protect themselves from. Malware is an unfortunate reality of living in a digital world, but there are many lessons we can learn from these attacks to safeguard sensitive material.
Remember the destruction WannaCry caused? The casualties included up to 300,000 encrypted computers in over 150 countries, not to mention the damage or loss of data entirely. The newest ransomware cyber-attack threat is far worse than WannaCry, and it's going by the name “Petya.”
Want to improve your cloud operations and take advantage of robust new technology options? Now you can, as you may have heard the news recently about the new partnership between VMware and Amazon Web Services (AWS), called VMware Cloud on AWS. Enterprise Strategy Group (ESG), an IT analysis, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community, recently published a technology brief announcing the new joint offering; read on for an overview of its structure and benefits.
The news is buzzing with instances of companies being taken for a ride by cyber thieves. Their new tactic? Injecting dangerous software into the organization and locking their data up until a ransom is paid. While the FBI still recommends not paying the ransom, enterprises are taking varying approaches to combatting ransomware. In this post we dive into some recent ransomware attacks and takeaways your organization can learn from them.
Nearly every day, there is a new cybersecurity breach to announce; businesses should be more alert than ever before. In 2015, the Ponemon Institute and Symantec discovered that a whopping 47 percent of U.S. data breaches were the result of a malicious insider or criminal cyberattack. Read on for an illuminating look into recent high-profile cases, and what you can learn from them.
With the wide range of reported cybersecurity incidents and hackers getting more creative than ever before, there is no shortage of threats to the modern enterprise. IT managers must not only secure current data and systems, but preemptively protect against ongoing future threats, which are constantly evolving. While there are well-known versions of malware, “Tellingly, WatchGuard’s inaugural Internet Security Report found that some 30 percent of malware in Q4 was new, or ‘zero day.’ (Not to be confused with zero-day exploits.) In other words, one-third of malware identified wouldn’t be caught by legacy antivirus solutions,” according to PYMNTS.
Unsecured printing and imaging leads to security breaches, putting organizations at risk of costly lawsuits and public relations nightmares.
Today’s printers can connect to wireless networks, scan and send documents, store data on hard drives, and even produce 3D materials. They have many of the same capabilities—and the same vulnerabilities—as computers. As their features increase, so do the opportunities for security breaches in the printing process.
How good are your enterprise’s security defenses? Today’s hackers have access to an arsenal of tools for carrying out targeted attacks, thanks in part to an anonymous and hidden area of the internet called the Dark Web (also called Deep Web or Darknet). Payment for purchases made there is typically in the international digital currency Bitcoin, which offers a fairly high level of privacy.
The job of an IT professional is challenging, especially since strengthening cybersecurity is constantly a moving target. With attackers trying new approaches and getting stronger with their tactics every day, protecting an enterprise’s data and information is more crucial than ever before. How can you ensure you’re covering all of your security bases? Start with managing the most common security risks, which are described in this article.
Ransomware is a flourishing IT threat, and one that can cost organizations thousands of dollars in lost data, ransomware repayments and security breaches. According to Marcin Kleczynski, the CEO of cybersecurity company Malwarebytes, "In the last six to 12 months, [ransomware] has just gone so aggressively to the business environment. We see companies from 25 people all the way to 250,000 people getting hit with ransomware."
Surely you’ve seen rampant news reports of malware breaches and incidents of cyber hacking at enterprises around the world. From hospital hackings to financial services heists, digital criminal activity is a very real threat in today’s business climate. Read on for the details your enterprise needs to know about malware, in addition to three tips to protect your organization.
If your organization is considering a move to cloud computing, but you are worried about signing up for the proper services for your company, consider test driving the offerings before you make the switch. A well-researched and properly planned cloud deployment is the best strategy for companies seeking to take advantage of this new technology to take, but IT pros may be concerned about potential speed bumps and setbacks.
The concept of “software-defined” is not new, in fact we’ve been replacing hardware with software for a long time. Think about the alarm clock you used in the 90’s. If you wanted to set your alarm clock for 30 minutes earlier than usual you had to rotate through 23 and a half hours to set your new time. But that was normal. Fast-forward to now and your alarm can be turned on, off, or adjusted with a click of a button – right on your mobile device – replacing hardware with a software enabled device.
At least once a year, you can find a report on the web about what the most common passwords are based upon leaked data. Think of these lists as the worst passwords you can ever use. Typically, 123456 and password top the list. Coming up the path of popularity are passwords 123456 and 123456789, as people are required to enter in longer passwords. Need a mix of letters and numbers? You might want to avoid abc123 and trustno1, among many others. Nowadays, a password security alone isn’t sufficient to lock anything down. How best can you secure your system to keep the bad guys out?
Did you know that your data could be compromised at this moment, even if none of your security measures have sounded an alarm? As companies across the nation reported data breaches throughout the past few years, one commonality was noted: in most breaches, the data was compromised for weeks or even months before anyone noticed. When you couple that fact with some of the expectations for data security in the coming years, you realize that both internal and external security in most organizations has to evolve if it’s going to do any good.
Managing internal access to data and software has always been a challenge for technical and security departments. In the past, security was often managed physically; workers couldn’t access what they couldn’t physically get to. Today, cloud computing and the need for employees of all levels to access data from disparate locations makes physical controls outdated in most industries. Instead, organizations are turning to a variety of cloud, software, and hardware-based security solutions, some of which are less effective than others.
An enormous challenge for technical and security departments within any organization is creating secure networks, apps, and servers without making access so difficult that legitimate production is impacted. This is true whether you are working with in-house employee-based systems or customer-facing solutions such as web portals or online account management. The consequences for not securing information are huge, ranging from federal or state sanctions to loss of customers or customer trust. At the same time, results of the wrong type of security or unnecessary security might include loss of productivity, inability to make deadlines or complete work, poor employee morale, and loss of revenues. Data protection is key, but how can you ensure you have the right solutions in place?