It’s 2018, do you know where your recovery plan is?

by Mauricio de Leon Data is King. Be it customer data, supply chain and resource management data, or the valuable intellectual property that forms the core of a business, it is all data; and it all needs to be stored and protected from external threats, but also made available and used internally. So, if data is King, you must ask yourself, who is on the wall, securing the gates, and making sure that the King  …>> more
BY MAURICIO DELEON, JANUARY 22, 2018
SECURITY

Nous sommes en 2018, savez-vous où vous en êtes avec votre plan de recouvrement ?

Par Mauricio de Leon Les données ont le monopole! Qu’il s’agisse de données sur les clients, de la gestion de la chaîne d’approvisionnement, des ressources, de la précieuse propriété intellectuelle qui constitue le cœur d’une entreprise, il s’agit de toutes les données; et tout doit être conservé et protégé contre les menaces externes mais également disponibles pour l’utilisation à l’interne. Donc, si les données sont Roi, vous devez vous demander, qui est aux barricades à  …>> more

Taking the first step towards IT security: Where to begin

In my previous post, I wrote about some of the many reasons why IT security is vitally important for businesses today. Now I want to look at some of the challenges that companies will face, and some of the technological solutions they will need to consider when deciding to improve IT security. Two considerations before you begin: Let’s say that the executive leadership of a company decides that IT security needs to be more of  …>> more

Reducing Cost, Increasing Flexibility, and Facing Future Threats: VMWare NSX and the Virtualized Network

It is often difficult for companies to understand and appropriately react to paradigm shifts that require radically different thinking. For technology companies, having the flexibility to react appropriately when a paradigm shift presents itself is absolutely critical. Apple’s move into mobile, and Microsoft’s move into cloud services are both examples of this. Whether your company is web facing with a large online presence, or a regular bricks-and-mortar business, technology is involved. From employee workstations, to  …>> more

IT Security: The door you didn’t know was open

As an IT security professional with many years in the business, I can’t remember a time when IT security has been as crucial to the success and survival of businesses. No matter how good a business thinks its IT security is, the bad guys have figured out how to pick the locks. According to Bob Martin from CISCO Systems, “With breaches at more than 13 retailers and a number of unknown breaches that were never  …>> more
BY HARRY ZAREK, JANUARY 17, 2017
CLOUD COMPUTING, SECURITY

Empower users or protect assets? We shouldn’t have to choose.

Business operates in a digital world where we spend a significant part of our day connected and interacting with people, applications and information both inside and outside our organisation. For our internal IT environment, we manage access to applications and data in a formal way. But when our staff go out to the internet, we can’t restrict where they go. We have an “honour principle” that they will go only to business relevant sites. But  …>> more