Financial services encompass banks, insurance companies, investment firms, analysts, consultants, and many more firms – each overseeing highly sensitive data on behalf of their clients and staff. As a consequence, this industry is subject to a range of regulatory compliance standards, including…
Author Archives: Mylon Staton
A Closer Look at Data Deduplication
Data deduplication is a method for reducing storage needs by eliminating redundant data so that only one unique instance of the data is actually retained on the storage media. Reducing the amount of data that needs to be transmitted across the network, especially to the cloud, can increase backup speeds and save storage costs.
Although new approaches to achieving data deduplication are continually being developed, here are the basic methods.
Password Managers Require Careful Selection & Use
Many of us have dozens of online accounts including social networks, email, shopping, and work. Each account requires its own password for authentication along with a user name. The problem is that no one can remember so many passwords and user names, so there is a tendency to re-use them. Continue reading
IoT Devices Now a Launchpad for DDoS Attacks
The proliferation of IoT (Internet of Things) devices offer numerous benefits for consumers when they plug devices such as cameras, light bulbs, thermostats, digital video recorders, refrigerators and other household items into the Internet. It is estimated that billions of IoT devices are in operation right now and their use is growing by leaps and bounds.
The lack of adequate security measures in these devices, however, poses serious risks to users and the greater Internet community. This is because vulnerabilities in IoT devices come from several sources:
Cloud Outlook for 2017 – Accelerated Growth
According to a recent report by Forrester, the cloud computing market will enter a phase of accelerated growth in 2017. This growth is being fueled by the need of companies to power their core business systems in addition to their customer-facing applications.
Key trends highlighted in the Forrester report include…
Ready for Mandatory Multi-Factor Authentication?
Passwords are no longer a sufficient means of controlling access to sensitive data, so the Payment Card Industry Security Standards Council (PCI SSC) is doing something about it. They are now recommending that organizations bolster access security with multi-factor authentication.
Why all the fuss?
Are Your IT Users Suffering from “Security Fatigue”?
A recent study by the National Institute of Standards and Technology (NIST) found that a majority of average computer users are experiencing “security fatigue” ̶ a weariness or reluctance to deal with security issues.
Typical examples of security fatigue include being tired of remembering usernames, passwords and PIN numbers; navigating multiple security measures; and dealing with account lockouts due to incorrectly entered passwords.
Cloud Adoption Grows, Getting Full Value Lags
Cisco has released the findings of a global study indicating that while cloud adoption continues to accelerate, few organizations are maximizing the value that cloud technology can offer.
According to the study, over 65% of organizations are using cloud to help drive business outcomes. Increased cloud adoption is being fueled by cloud-native applications, including security and Internet of Things (IoT) cloud-based solutions.
What You Need to Know About the Yahoo Hack
Two years ago, Yahoo became the victim of the biggest known hack in Internet history. This is old news, except for one recent development – Yahoo claims to have just found out about it and reported that the access credentials of 500 million email accounts had been stolen!
How Secure is Your Meeting Room?
Corporate meeting rooms are commonly used for discussions that range from the mundane to the highly sensitive. Remote offices can be brought into these discussions with audio and video systems and applications that run over IP networks. Yet most meeting participants may be unaware that their conversations can be monitored by hackers, even when the AV equipment is not in use.




