<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=446209&amp;fmt=gif">

The Five Core Principles of Modern Enterprise Cybersecurity (Part 2)

By Greg LaBrie |   Feb 15, 2018

gnIn Part 1 of this blog series, we discussed the unprecedented amount of money being allocated to cybersecurity in the coming year and beyond, as well as how money, without a core foundational strategy, could be simply money that is tossed to the wind. In Part 2, we will look at the remaining three of the five core principles that can make a meaningful difference concerning the your enterprise cybersecurity and users.

The Five Core Principles of Modern Enterprise Cybersecurity (Part 1)

By Greg LaBrie |   Feb 13, 2018

It is the start of a new year - that time in which we break down the complexities of life into more manageable elements in order to strategize for the year ahead and attempt to improve upon our efforts of the year prior. This also applies to your company’s enterprise cybersecurity strategy. According to Gartner, worldwide cybersecurity spending reached $90 billion in 2017.

Why Companies are Turning to Azure

By Greg LaBrie |   Feb 08, 2018

When we talk about cloud computing we are usually referring to the public cloud. The concept of the public cloud is revolutionary. The idea of ridding ourselves of our hardware centric data centers to a more flexible, scalable, and resilient world of the cloud is indeed liberating. Internal IT can spend their time matching business needs with solutions rather than allocating their time to maintaining hardware that will only have to be replaced one day. It is wonderful to contemplate and visualize all the ways the cloud can make your job as an IT manager so much easier.

A look at Composable Infrastructure and HPE Synergy

By Jay Cardin |   Feb 07, 2018

If your data center is on an evolutionary track from siloed and hardware-centric to agile and software-defined, you’re aware of converged and hyperconverged infrastructures. If you haven’t yet been introduced to composable infrastructure, welcome to the next gen step in your data center modernization journey.

Aruba Clearpass: A Clear Solution for Enterprise Cybersecurity

By Greg LaBrie |   Feb 06, 2018

With the advancement in technology, employees are no longer stuck working at their desk in order to access the information they need to do their jobs. This freedom allows greater flexibility and productivity, but it also opens the door for enterprise cybersecurity threats and the potential for unauthorized access to proprietary information.

Why you might not want to go all-in on AWS

By Greg LaBrie |   Feb 01, 2018

There are a number of compelling reasons to migrate your services and resources to the cloud such as cost savings, agility, scalability, and redundancy. Another reason is to escape the entrapment of vendor lock in. Ironically however, some enterprises find themselves moving to the cloud, only to constrain themselves with the same restrictions that plagued them in the traditional datacenter. Others are finding themselves in a problematical situation of competing organizations that muddle the cloud landscape.

A Look Back at 2017’s Most Destructive Ransomware Attacks

By Michael Thweatt |   Jan 30, 2018

Ransomware was a top concern for enterprises around the world in 2017 and continues to be one moving forward. Organizations around the globe are increasingly dependent on technology to help reach business goals, but it comes with risk. Cybercriminals are masters at exploiting technological weak spots to hit companies where it hurts the most.

Exploring AZURE vs AWS

By Greg LaBrie |   Jan 25, 2018

As a society, we love to put entities head-to-head against one another. Automotive enthusiasts have debated Ford vs. Chevy for decades. Every year college football fans debate which conference is stronger: Big Ten or SEC. When it comes to IaaS cloud computing, the inevitable debate between Azure and AWS separates the room between enthusiasts of each provider as well. Unfortunately, deliberating between the two in hopes of distinguishing a clear winner is kind of like debating who the greater basketball player is between LeBron James and Michael Jordan. It kind of all depends on your point of view and what you value.

Recent Malware Attacks and What Businesses Can Learn From Them

By Michael Thweatt |   Jan 23, 2018

It feels like every time we turn around there is a new cybersecurity threat to report that organizations need to protect themselves from. Malware is an unfortunate reality of living in a digital world, but there are many lessons we can learn from these attacks to safeguard sensitive material.

3 Critical Tips for Mitigating CPU Vulnerabilities [Meltdown and Spectre Update]

By David Fafel |   Jan 18, 2018

It’s been two weeks since the IT world was rocked by the news of the CPU vulnerabilities known as Meltdown and Spectre. It’s making headline news due to how far the vulnerabilities extend—to nearly every processor manufactured over the past 20 years—as well as the potential impacts in mitigating these vulnerabilities. Every server, computer, tablet, phone or any other computing device with a modern CPU is potentially affected. (See WEI’s Customer Advisory about Meltdown and Spectre in this blog post.)

About WEI

WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.

Subscribe to WEI's Tech Exchange Blog


Categories

see all
Contact Us