<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=446209&amp;fmt=gif">

The Cybersecurity 3-Layer Wedding Cake

By Bill Frank |   May 17, 2024

See Bill Frank’s biography and contact information at the end of this article.

This article is Part Two of my series on managing cyber-related business risks. In Part One, I discussed the relationship between Defensive Controls and Performance Controls. Defensive Controls directly block threats. Performance Controls measure the effectiveness of Defensive Controls and suggest improvements.

Five Attributes of IT Product Purchasing That Positively Impact the Environment

By Patrick Gamble |   May 16, 2024

Environmental sustainability now matters. Many companies are adopting sustainability objectives to fulfill their duty to the environment, comply with regulations, enhance market competitiveness, realize cost savings, and meet investor expectations. An integral component of these sustainability efforts is making sustainable purchasing decisions.

For your benefit, WEI has identified five key attributes of IT product purchasing that are known to have a positive impact on the environment.

Reduce Risk And Simplify Your Cloud Journey With A Modern HCI Solution

By Patrick Gamble |   May 14, 2024

Today, businesses are constantly seeking ways to be more agile, reduce costs, and enhance security. Traditional infrastructure, with its isolated components and complex management, can hinder these objectives. Understandably, many businesses worry about disruptions during migration, data security, and a smooth cutover to a new system.

Streamlining Critical Operations With WEI's Staff Augmentation

By Greg Palmer |   May 07, 2024

Consider the impact that the addition or subtraction of key players can have on a professional sports team; offensive and defensive schemes dependent on a particular skill set can be compromised with each personnel change. Similarly, in the rapidly evolving fields of IT and telecommunications, the departure of a seasoned IT professional can significantly disrupt operations, particularly when it involves the loss of specialized expertise.

Four Efficiency Benefits of IT Lifecycle Management

By Patrick Gamble |   Apr 22, 2024

Today, many businesses are striving to be good corporate citizens to help ensure a sustainable world for future generations. Adopting environmentally and socially responsible practices, obtaining various sustainability certifications, and engaging in cause-related marketing are increasingly popular as they resonate with consumers who value sustainability.

Using Performance Controls to Address Cybersecurity’s Achilles Heel

By Bill Frank |   Mar 21, 2024

See Bill Frank’s biography and contact information at the end of this article.

[Note: This is an updated version of the original article posted on March 21, 2024. I replaced the term "Governance” Controls with “Performance” Controls to eliminate any confusion with the NIST Cybersecurity Framework 2.0 use of the term “Governance.”

I focus here on automated controls that monitor and measure the “performance” of “Defensive” controls that directly block threats or at least alert on suspicious activities.

How well are your cybersecurity controls performing? Measuring control efficacy is challenging. In fact, under-configured, misconfigured, and poorly tuned controls, as well as variances in security processes are the Achilles Heels of cybersecurity programs.

A mismatch between risk reduction potential and performance results in undetected threats (false negatives) as well as an excessive number of false positives. This leads to an increase in the likelihood of loss events.

All controls, whether people, processes, or technologies, can be categorized in one of two ways – Defensive or Performance.

Strengthen Security And Networking: Five Reasons To Invest In SASE For Hybrid Work

By Josh Cronin |   Jan 02, 2024

To stay updated in the evolving IT environment, organizations are consistently navigating multi-cloud transitions and embracing hybrid work models. The increasing dispersion of users and applications across platforms heightens the difficulty of ensuring a functioning, resilient, and consistent user experience.

Improve Cybersecurity Posture With Nutanix Data Lens

By Patrick Gamble |   Nov 21, 2023

Many enjoy capturing photos and videos with their phones, but we often forget that our phone storage can get full fast. To solve this, some store their photos in the cloud. To keep our memories safe from loss or hacking, we utilize passwords and other security measures. But it's tough to keep our data organized and protected online.

How Fortinet SOCaaS Strengthens Cybersecurity Defenses

By Mike Thweatt |   Nov 06, 2023

Cyber threats are in a constant state of evolution, posing a danger to organizations of all sizes, from the largest of enterprises to small and medium-sized businesses. All face heightened vulnerability to cyberattacks for several reasons, including limited resources in the SOC and a slower response to emerging threats. Even enterprises that have the budget to swiftly adopt new technologies and data transfer methods still struggle with effectively measuring ROI from deployed security tools and sorting aggregated data coming through their firewalls. 

Four Ways Veeam and ExaGrid Support Your Data Protection and Backup Strategy

By Jay Cardin |   Oct 17, 2023

In the fast-moving world of data security, a resilient and dependable backup solution is an absolute necessity. For more than a decade, ExaGrid and Veeam have teamed up to offer top-notch products that communicate seamlessly together. The two have harnessed their expertise to combine their highly differentiated products into scalable and cost-effective backup solutions, thus enabling enterprises to achieve the performance and efficiency needed to realize their backup, recovery, and disaster recovery (DR) goals.

    About WEI

    WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.

    Subscribe to WEI's Tech Exchange Blog


    Categories

    see all
    Contact Us