Healthcare Executive Commentary
-
How To Keep Your Customers Protected From Constantly Changing Ransomware
11/18/2016
If you’re old enough to remember 1989, you might recall two key events: the Berlin Wall came down, and the first ransomware attack appeared on the scene. This was the AIDs Trojan horse, which, upon installation, encrypted users’ files and demanded $189 be sent to a post office box in Panama to “renew the license.”
-
3 Premium Ways To Prevent IT Project Failure
11/8/2016
It is an unfortunate reality most IT projects don’t end well; in fact researchers found 68 percent end up marginal or outright failures. For software-related projects, only 16.2 percent are completed on time and on budget. If you are a large organization, that number drops to 9 percent. Many never realize the promised value or ROI.
-
The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach
11/7/2016
Over the last year, Threat Intelligence (TI) has become a hot topic for the cybersecurity industry. Organizations of all sizes are looking to the channel to provide recommendations on what to purchase, how to implement, and how to gain the greatest value from TI. It is therefore critical the channel clearly understands what TI is, and how organizations can capitalize on its value.
-
Warning: What You Need To Know About The Security Workforce Crisis
11/4/2016
Is the shortage of trained security people the greatest vulnerability?
-
3 Best Practices For Securing Customer Data At Multiple Locations
11/3/2016
For customers operating from a single location, protecting data, applications, and IT infrastructure can be fairly simple and straightforward. Yet, when a customer has multiple locations, branch offices, or remote workers, data protection and cybersecurity can begin to pose a significant challenge — one savvy MSPs can expertly address when they put the right tools in place and adopt the following best practices for ensuring data security at multiple locations.
-
Will Your Virtual Data Traffic Take The Detour Around Your Firewalls?
11/1/2016
We’re soon going to need a new descriptor going forward when we refer to the data center. This rings true because network virtualization across private and public environments means the locations of compute and storage resources to facilitate on-demand networking do not sit statically in what could be considered a typical data center anymore. Virtual workloads now dart around like bees in a field of clover. It’s no longer a question or if but when all of this will affect your network.
-
How To Help Clients Protect Their Data From Ransomware Attacks (Hint: They Need More Than Anti-Malware)
10/13/2016
Want to provide your clients with a solution that can help them protect their most valuable investment — their sensitive data — while generating a major new revenue stream? Read on. By Gary Watson, Vice President Technical Engagement, Nexsan
-
6 Ways To Improve The Security In Your Offering
10/12/2016
The cyber security threat to small and medium businesses is growing at an alarming pace. By Austin Justice, Vice President, Justice IT Consulting and ASCII Group Member Since 2015
-
What To Examine When Considering Cyber Insurance
10/10/2016
Robert Mueller, the former head of the FBI, is quoted as saying, “There are only two types of companies — those that have been hacked and those that will be.” By Christopher Camejo, Director of Threat and Vulnerability Analysis, NTT Security
-
Building A Next-Gen Managed Security Practice
9/6/2016
Managed Service Providers (MSPs) have long served as their customers’ IT security experts. Small- and medium-sized businesses typically do not have the IT expertise or resources in-house, and so rely on their MSPs to provide the high level of IT support they could not create on their own. As the security landscape evolves and becomes more complex, MSPs also find themselves managing multiple vendors for different product areas, from endpoint security, email, disk encryption, network and mobile security, and wireless capabilities.