5 Tips IT Managers Can Use to Protect Sensitive Data
Sophie Pellissier | | Security
Sophie Pellissier of Ipswitch looks at 5 facts IT managers should be aware of to protect sensitive data.
Sophie Pellissier | | Security
Sophie Pellissier of Ipswitch looks at 5 facts IT managers should be aware of to protect sensitive data.
Want to know how healthcare IT organizations can best prove their worth to the business? Optimize the 835 Remit and 837 Claim process so there are fewer rejections, clarifications, missed files and delays.
For 95 percent of enterprises, one hour of downtime costs $100,000 or more in SLA penalties according to data from ITIC.
Greg Mooney | | Security
If you're like me and have a knack for cyber security trends, you will find yourself having many sleepless nights. Our lives and data is are the internet for the taking and the weakest link in finding compromised data is knowing it's been compromised in the first place.
Some things happen to a healthcare CIO that just don't happen to IT execs outside of the healthcare industry. On some days, you walk down the hospital corridors beaming, thinking of how your work directly improves human health and quality of life. On other days, you'd...
Exfiltration is a decidedly unpleasant word, and it's rarely connected with Google's benign application suite used freely by millions all over the world — Google Apps. Specifically, how secure is Google Drive? Google Drive, a potentially massive repository of...
While it’s important to secure data no matter where it lives, data in motion is at its most vulnerable for hackers and needs to be a focus point for your security and compliance efforts.
Aaron Kelly | | Security
An audit to review PCI compliance at a large US-based transportation company revealed a number of file transfer problems that kept them from getting a passing grade. And with the PCI 3.1 “Business as Usual” mandate, the company’s auditors stressed the importance of...
Adam Bertram | | Security
When writing large PowerShell scripts or modules, it will eventually become necessary to split up the code into modular pieces. Modularity can be achieved by using basic and advanced PowerShell functions. It also encourages good coding practices. One way to build modular...
As noted by Tech Financials, infrastructure outsourcing is now a go-to option for service providers, since it allows them to maximize their strengths while shoring up their weaknesses with third-party expertise. But what does this trend mean for companies at large? Is it...
Adam Bertram | | Security
With companies moving services to the cloud, applications offering robust APIs and a driving need for automation, we need a more mature scripting language.
Adam Bertram | | Cloud | Security
As part of this cloud transition, it's important to realize that even though you can't see a system it still needs to be managed. Let's talk about PowerShell automation.
Adam Bertram | | Security
As an IT professional or manager, when you think of the word "script," what comes to mind? Are images of VBScript and batch files still haunting you to this day? Are you just thinking about a nice, little piece of code that automates some mundane task? If so, let's get...
When it comes to which server operating system is better, you know the score: Redhat for security, Windows Server for easier all-around operation.
Aaron Kelly | | Security
We've grown accustomed to hearing about cyber security failures at large enterprises like Target. But security threats and breaches are not just limited to the Fortune 500s of the world. Businesses of all shapes and sizes are vulnerable to cyber security threats and data...
Andy Morris | | Security
Continental Automotive is one of the world's leading automotive suppliers, employing over 215,000 people in 55 countries. With five divisions and a global network, Continental has a lot of data to transfer between several thousand internal and external customers,...
Aaron Kelly | | Security
There are quite a few routes you can take when it comes to a file transfer solution and the type of encryption to use, but say you are an SMB with very limited budget. How are you going to protect your data when you don’t have the money that an enterprise has access to?...
IT audit procedures run the gamut from internal to market-specific. Whether it's healthcare's HIPAA or the credit-card industry's PCI, you have to know the compliance audit's goals. These rarely include a fully functional missile defense system to protect against...
In early June, the news broke that the Angler exploit kit was no longer the method of choice for malware delivery, especially ransomware. According to SC Magazine, attackers have now switched to the Neutrino exploit kit, perhaps in an effort to avoid detection.
Joe Hewitson | | Security
In the modern business world, applications are the vehicles for getting stuff done. This has become even more apparent as mobile technology enables us to be more productive in more places than ever before. But despite all the buzz about security in the mobile world,...
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.