Blog

The IoT Security Challenge

The internet of Things (IoT) is much-talked-about technology. Driven by low-cost sensors, ubiquitous connectivity and updates to the Internet Protocol (IP), IoT is rapidly being adopted. Research firm Gartner expects over 8 billion devices connected in 2017. Cities use IoT to relieve parking congestion by collecting data on open parking spots; farmers can measure moisture in soil; and manufacturers use this technology to track inventory in their supply chain. Because these devices may use machine-to-machine connectivity without human intervention, this can increase the IoT Security Challenge. Here are some security considerations for IoT.

Disaster Recovery and Data Protection –Now More Than Ever

Recent Hurricanes Harvey and Irma, along with major earthquakes in Mexico, remind us how vulnerable we can be to disasters, and underscore the importance of data protection. As businesses depend on access to a range of systems–including call center, communications and collaboration application, customer management, and more–having a solid data protection plan can help you in a disaster recovery scenario. Now more than ever, a range of options exist to help maintain business continuity. Here are a few options to consider.

Considering Cloud Security

According to a recent research report “Assessing the Cloud Security Landscape” by the Computing Technology Industry Association (CompTIA), 85% of business owners and IT professionals participating in a survey responded that they are Confident in their Cloud Service Provider. No wonder research firm IDC predicts the market for public and private cloud security to more than double over the next few years. What Cloud Security Concerns are top of mind with business owners, and what can you do to reduce your risk? Read more to find out…

How is Your Network Health?

Your network is the backbone of your IT Infrastructure. Your network health is also an integral part of your defense against Cyber threat. Cloud Computing, Communications and Collaboration, Data Protection, and Digital Transformation put more reliance on your network.  This begs the question, how is your network health? Ask yourself these three questions to find out the answer…

Can A Business Continuity Plan Save Your Reputation?

Reputation Management is a hot topic in the boardroom these days. Having a solid business continuity plan could make or break your company’s ability to survive a data breach or other systems failure that could tarnish your hard-earned reputation. Company news about data loss, systems downtime and other unplanned interruptions occur with regularity. According to technology research firm Gartner, a business that has a catastrophic data event has a two-year survival rate of just 6%. Surprisingly, your company can avoid these scenarios by having a solid BC/DR Plan.

Getting the Most from Cloud Computing

Cloud Computing adoption continues to outpace the growth rate of total IT spending. According to research firm Gartner, the market for public cloud services will continue expanding, with year-over-year revenue growth of 17.3%. Compare this to Gartner Growth expectation of total IT Growth of 1.4% and you can see how the market for Cloud Computing is maturing. Cloud Service Providers offer a wide range of solutions.

How to Avoid Being a Ransomware Hostage

Ransomware, spyware, phishing schemes, and other Cyber attacks are commonplace in today’s world of technology. According to a recent article in Forbes, ransomware attacks grew at an accelerated pace in 2016 with reports of 638 million attacks, almost 200 times more than the number of ransomware attacks in 2015. Most experts agree that Ransomware attacks will continue to occur–so what can you do to avoid being a ransomware hostage?

Page 1 of 1412345...10...Last »

Archives