cyber security month

Is Your Cybersecurity Posture Proactive or Reactive?


Two executives walk into their respective boardrooms early Monday morning. Each is greeted with news of a security incident (aka breach) that was discovered over the weekend.   The scenarios below outline the security posture of two organizations facing the … Continued

enterprise cyber security

Endpoint Security


Total Endpoint Security As companies grow increasingly dependent on the Internet as a means to conduct business, security threats loom ever larger. Penetration from the outside, denial of service attacks and theft xof transaction information are all top concerns for … Continued

3500

Cisco Systems: dotcom crash survivor seeks further reinvention


Cisco Systems: dotcom crash survivor seeks further reinvention Tech firm, which may cut 14,000 jobs, was the world’s most valuable company but is now dwarfed by younger competitors Source: https://www.theguardian.com/technology/2016/aug/17/cisco-systems-dotcom-crash-survivor-seeks-further-reinvention Cisco was founded in 1984 and soon became a Silicon Valley … Continued

Data security compliance

Companies that outsource find they need to keep some IT work in-house


Geographic restrictions sometimes influence an organization’s use of colocation, cloud and other remote outsourcing alternatives. Regulatory compliance and jurisdictional authority are serious concerns for businesses. Not only does compliance affect data retention, security, privacy and legal discovery, but it also imposes geographic … Continued