Author Archives: Mylon Staton

A Closer Look at Data Deduplication

Data deduplication is a method for reducing storage needs by eliminating redundant data so that only one unique instance of the data is actually retained on the storage media. Reducing the amount of data that needs to be transmitted across the network, especially to the cloud, can increase backup speeds and save storage costs.

Although new approaches to achieving data deduplication are continually being developed, here are the basic methods.

Continue reading

IoT Devices Now a Launchpad for DDoS Attacks

The proliferation of IoT (Internet of Things) devices offer numerous benefits for consumers when they plug devices such as cameras, light bulbs, thermostats, digital video recorders, refrigerators and other household items into the Internet. It is estimated that billions of IoT devices are in operation right now and their use is growing by leaps and bounds.

The lack of adequate security measures in these devices, however, poses serious risks to users and the greater Internet community. This is because vulnerabilities in IoT devices come from several sources:

Continue reading

Are Your IT Users Suffering from “Security Fatigue”?

A recent study by the National Institute of Standards and Technology (NIST) found that a majority of average computer users are experiencing “security fatigue” ̶  a weariness or reluctance to deal with security issues.

Typical examples of security fatigue include being tired of remembering usernames, passwords and PIN numbers; navigating multiple security measures; and dealing with account lockouts due to incorrectly entered passwords.

Continue reading

Cloud Adoption Grows, Getting Full Value Lags

Cisco has released the findings of a global study indicating that while cloud adoption continues to accelerate, few organizations are maximizing the value that cloud technology can offer.

According to the study, over 65% of organizations are using cloud to help drive business outcomes. Increased cloud adoption is being fueled by cloud-native applications, including security and Internet of Things (IoT) cloud-based solutions.

Continue reading

How Secure is Your Meeting Room?

Corporate meeting rooms are commonly used for discussions that range from the mundane to the highly sensitive.  Remote offices can be brought into these discussions with audio and video systems and applications that run over IP networks. Yet most meeting participants may be unaware that their conversations can be monitored by hackers, even when the AV equipment is not in use.

Continue reading