Blog

Thinking About How Your Company Can Exploit IoT?

The global installed base of IoT endpoints is expected to grow to 30 billion by 2020, so we’ll all be dealing with the IoT at some point. Much of the IoT planning concerns our clients face center on how to manage, monitor and secure this new environment.

The situation calls for a comprehensive management solution that DataLink’s partner VMware is offering. Pulse IoT Center allows businesses to:

Continue reading

The Low-Tech Hack You Might be Overlooking

No business would dream of installing a network without passwords, encryption or firewalls to protect their data. Yet many businesses invite trouble by routinely allowing sensitive information to be viewed in plain sight.

Visual hackers are adept at stealing sensitive information simply by observing their victims as they work on their computer, laptop, tablet or smartphone. According to a recent study, 88% of these hack attempts are successful. Continue reading

U.S. Senate Bill Addresses Critical IoT Security Gaps

IoT devices are not only being increasingly used to provide critical functionality for people and infrastructure, they are also being used by criminals in major cyberattacks.

Congress is finally taking notice of the growing problem… Virginia’s Democratic Senator Mark Warner and Colorado’s Republican Senator Cory Gardner have introduced a new bill titled, “The Internet of Things Cybersecurity Improvement Act of 2017”. Continue reading

New Precedent for Data Breach Class Action Suits

In a decision that could set a precedent for other data breach cases, the U.S. Court of Appeals for District of Columbia Circuit ruled in August that a class action lawsuit filed against health insurer CareFirst Blue Cross Blue Shield can be resuscitated. This action overturns a lower court’s decision last year to dismiss the case resulting from a 2014 cyber attack that impacted the personal data of over one million individuals.

The court held that the theft of personally identifiable information, if true, creates enough of a risk of identity theft that could be traced back to CareFirst’s negligence in not securing its data.

Continue reading

Scammers Targeting Employees via Text Messages

In addition to circumventing your company’s spam filters, Internet bad guys are targeting your employees directly through their smartphones with “smishing” attacks that are hard to stop.

The scam starts with a text message that convinces the employee to send an email to the scammers. Once contact is established, the victim gets caught up in the scam. Continue reading

Network Upgrades Top Priority When Adopting Cloud

As organizations race to adopt cloud technologies there is concern that they are not taking a methodical approach to updating their network infrastructures.

In an insightful article appearing in TechTarget, Amy Larsen DeCarlo writes about the rapid growth in hybrid clouds, where workloads are moved between and among multiple clouds, including on-premises facilities. Continue reading