Of all the strategies and tactics available to prevent breaches, deter data
leakage and theft, control access and secure beyond the so-called network
perimeter, the one that is emerging as an achievable and affordable best
practice is that of unified security from the cloud.
But if you look across the web, you will no doubt come across various
versions of what constitutes “unified,” what is “protected,” and,
what is “security from the cloud?” Luckily this means that the concept of
unified security from the cloud is becoming more and more of a best practice.
In general, the practice of unified security is the centralization of all
security functions under one umbrella across the enterprise. This means more
than ensuring data encryption. It means more than access policies. It means
more than intrusion detection, malware blocking, data review. It’s more
than ensuring ... (more)
Users are making it too easy for hackers.
If we take a closer look at the 6.5 million hashed LinkedIn passwords that
leaked we find a large swath of the user population are ignoring warnings of
overly simplistic and obvious passwords. Would you believe the most common
word or phrase found in a 160K sampling of the list was “link”? And would
you further shake your head in disbelief that “1234” and “12345”
followed close behind. Rounding out the top 10 were “work,” “god,”
“job,” “angel,” “the,” “ilove,” and “sex.”
More so than Facebook, LinkedIn is the social media of choice for bu... (more)
In business, data is currency. It is the oil that keeps the commercial engine
in motion and databases are the digital banks that store and retrieve this
valuable information. And, according to IDC, data is doubling every two
years. But as the overall amount of data grows, so does the amount of
sensitive and regulated data. All this data stored by enterprises requires
high levels of security. Presently (again, according to IDC) only about a
quarter of that data is being properly protected now. Like all currency, data
must be protected.
And herein lays a key issue. Too many execut... (more)
One byte at a time.
Now before you roll your eyes at my stupid pun, consider the deeper wisdom to
this IT twist on an very old adage.
Security is big. It encompasses a great many definitions, confronts a great
many issues and is addressed through a great many solutions using a great
many formats. For many organizations, it can be an overwhelming proposition.
Beyond the issues of data defense, regulatory compliance, traffic management,
identity regulation, archiving, reporting, access control, intrusion
detection, encryption, app administration, help desk assistance, there is the ... (more)
It's not a new term or concept. You probably recognize that it’s happening
within your own organization. Shadow IT is the appropriation and use of IT
assets and applications without organizational approval. And it happens
more than you know. Sally the sales rep gets a label template design
application, Marco from HR downloads software that manages inbound resumes.
Kelsey in marketing signs up for a WordPress page and social media accounts.
All too often, employees are not going through corporate channels to get what
they need to achieve their goals.
And every time they do, the ... (more)