One byte at a time.
Now before you roll your eyes at my stupid pun, consider the deeper wisdom to
this IT twist on an very old adage.
Security is big. It encompasses a great many definitions, confronts a great
many issues and is addressed through a great many solutions using a great
many formats. For many organizations, it can be an overwhelming proposition.
Beyond the issues of data defense, regulatory compliance, traffic management,
identity regulation, archiving, reporting, access control, intrusion
detection, encryption, app administration, help desk assistance, there is the
job the IT pro was hired to do…ensure the smooth technical operation of
their organization. Securing the disappearing network perimeter and beyond
has become more than a full-time job in itself.
This is a Gordian Knot conundrum for smaller enterprises and SMBs. In many
cases, they are under... (more)
Security is not an all-or-nothing proposition. And that’s part of the
problem. It creates blind spots; gaps in vulnerability. Partly because of the
inherent complacency that after a company institutes a new security
initiative that hackers will be held at bay, or the employees won’t be
tempted to make off with a database or a hundred other internal or external
I have long promoted that security is as much about planning and process as
it is about the various solutions that are deployed to protect networks,
data, and other assets.
Security is no longer a wall. Stick up ... (more)
So much is written about the events outside your perimeter; those nefarious
and shadowy individuals and offshore syndicates who are looking to steal
technology or personal data or piggyback on your servers to peddle everything
from pirated products to pornography, implant botnets or viruses, or simply
to create corporate chaos. With all that weighing on our collective IT asset
protection strategies, it is easy to miss what a new Carnegie Mellon report
is pointing to as one of the fastest growing threats…insider breaches. Even
KPMG says this threat has tripled since 2007.
They co... (more)
It’s obvious the rise of SaaS (software-as-a-service) has changed the game.
The benefits of subscribing to a cloud-based application service are already
well-known and documented: cost-efficiencies, speed, hands-off maintenance,
etc… It’s no longer an emerging practice and, for most IT managers, has
become an inextricable component of any go-forward IT network strategy. What
this means is now there are dozens of new sign-ons per user from a variety of
endpoints (including mobile and tablet). And if we are talking
enterprise-wide deployments, this is can be as challenging as herdi... (more)
It's not a new term or concept. You probably recognize that it’s happening
within your own organization. Shadow IT is the appropriation and use of IT
assets and applications without organizational approval. And it happens
more than you know. Sally the sales rep gets a label template design
application, Marco from HR downloads software that manages inbound resumes.
Kelsey in marketing signs up for a WordPress page and social media accounts.
All too often, employees are not going through corporate channels to get what
they need to achieve their goals.
And every time they do, the ... (more)