Writing in Manufacturing Business Technology, Lisa Pope offers 12 reasons why 2017 is shaping up to be the year of Cloud adoption. She notes that Cloud deployment is the “must-have” starting place for new technologies. Plus, it provides the agility necessary for businesses to remain competitive.
She points to these and other factors that will combine to drive Cloud deployment…





Highly publicized insider data thefts and security breaches highlight the increasing need for better security practices and solutions to reduce the risks posed by malicious insiders as well as unintentional insiders.
The recent leak of 8,000 pages of CIA documents has exposed the tools and methods used by the agency to surveil and capture information from smartphones, TVs, routers and other devices. Aside from the obvious national security implications of this leak, its impact on businesses of all types and sizes could be enormous if IT departments do not pay close attention.
A recently released study by Arctic Wolf Networks, “The State of Mid-Market Cyber Security: Findings and Implications,” reveals that major gaps exist among IT professionals between the perception and reality of cyber security challenges.
A recent report from CompTIA indicates that SMBs are ready to spend big on technology this year, even when it’s not clear whether their business goals are being met after implementation.
Organizations are facing an onslaught of new security challenges and are busy deploying tools to tighten up their networks against hack attacks. Despite these efforts, email remains a highly successful attack vector for cyber criminals because it’s still too easy for employees to fall victim to social engineering ploys that can result in catastrophic data breaches. In the face of this formidable threat, what can be done?
Providing employees with the ability to work remotely – with full access to their desktop voice and data and applications – has become an essential element of business continuity, especially in our area, where a winter snow blast can suddenly force streets and buildings to close, potentially putting your business on hold.
After Indianapolis-based American College of Education fired its IT manager, it discovered that the administrative password to its Google cloud account was changed, preventing 2,000 graduate students nationwide from accessing their email, papers and course work.
If your organization handles protected health information, as defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA), you are required to conduct comprehensive and timely risk assessments. As Federal regulators ramp up their audit activities, the potential for enforcement action is now a reality.