Writing in Manufacturing Business Technology, Lisa Pope offers 12 reasons why 2017 is shaping up to be the year of Cloud adoption. She notes that Cloud deployment is the “must-have” starting place for new technologies. Plus, it provides the agility necessary for businesses to remain competitive.
She points to these and other factors that will combine to drive Cloud deployment…
With the growing popularity of Voice-over-IP, phone hacking continues to evolve, costing businesses billions of dollars annually in lost productivity and higher phone bills. That’s because Internet technologies, including premises and cloud voice systems, suffer from a growing list of Internet-related security vulnerabilities, offering hackers a variety of new attack vectors.
Since an IP Phone system typically shares the same data network as other IT systems, a breach of the phone system can lead to a breach of other IT systems as well. There are many variations of the attacks that can be launched against VoIP phone systems to inflict damage on businesses. Continue reading
Highly publicized insider data thefts and security breaches highlight the increasing need for better security practices and solutions to reduce the risks posed by malicious insiders as well as unintentional insiders.
The recent leak of 8,000 pages of CIA documents has exposed the tools and methods used by the agency to surveil and capture information from smartphones, TVs, routers and other devices. Aside from the obvious national security implications of this leak, its impact on businesses of all types and sizes could be enormous if IT departments do not pay close attention.
A recently released study by Arctic Wolf Networks, “The State of Mid-Market Cyber Security: Findings and Implications,” reveals that major gaps exist among IT professionals between the perception and reality of cyber security challenges.
The survey found that IT professionals at smaller companies had very high confidence in their cyber security defenses, but in reality they struggled to defend against malicious activity that has become more sophisticated, more targeted and severe.
A recent report from CompTIA indicates that SMBs are ready to spend big on technology this year, even when it’s not clear whether their business goals are being met after implementation.
Of 600 businesses surveyed, only 16% believe they are getting an excellent return on their tech investments. While 44% claim good ROI, another 40% characterized their results as “just okay” or “disappointing.” Continue reading
Organizations are facing an onslaught of new security challenges and are busy deploying tools to tighten up their networks against hack attacks. Despite these efforts, email remains a highly successful attack vector for cyber criminals because it’s still too easy for employees to fall victim to social engineering ploys that can result in catastrophic data breaches. In the face of this formidable threat, what can be done?
Providing employees with the ability to work remotely – with full access to their desktop voice and data and applications – has become an essential element of business continuity, especially in our area, where a winter snow blast can suddenly force streets and buildings to close, potentially putting your business on hold.
After Indianapolis-based American College of Education fired its IT manager, it discovered that the administrative password to its Google cloud account was changed, preventing 2,000 graduate students nationwide from accessing their email, papers and course work.