Do I really need an information security policy?

Do I really need an information security policy?InfoSec Policy, Standards and Procedures - don't leave home without them!Implementing a Security Policy is all about mitigating risk. The goal is to prevent any unauthorized access, use, disruption, manipulation, or destruction of information. Since we have hackers and bots and new breeds of AI and Computer Learning attacking our networks every secon…

The Magic of Hyper-Convergence

So what is the big deal about hyper-convergence, and what is the difference between converged and hyper converged infrastructure?The difference between a converged infrastructure and a hyper converged is the following. CI (converged infrastructure) utilizes a single chassis to manage the fundamental aspects of a data center: Compute, Storage, Networking, and Server Virtualization.Hyper-converged i…

I Always Feel Like, Somebody's Watching Me

And in some cases, that’s a good thing.This is not a case of paranoia, (it’s not a case of being stuck in 90’s music either) this is the 21st century and it’s scary out there.Network security for corporations is growing to be the number one issue that often times companies can’t manage because it remains a low priority. THAT statement makes no sense.As of 2015 $24- $120 BILLON corporate dollars ha…

An additional External Pen Test is a no-brainer for every company, no matter the size, for 2017

Let's face it. You cannot turn on any major media outlet today without hearing about “hacking.” Whether it’s alleged hacks to affect an election, to attempt to take over a power grid, to steal health care records and information, or simply for someone to fill up their gas tank on your dime through simple identity-theft level hacking – cyber security is an issue for everyone everywhere!We read abo…

Managed Security

Firewalls have long been consider the primary defense against cyber intrusion but today's cyber criminals are using vastly more sophisticated techniques to bypass firewall protection and compromise business systems. Keep intruders out while enabling daily internet operations requires a comprehensive set of security policies and constant monitoring to ensure your systems and data are protected…

IT Security Planning for 2017 – Protect, Detect, and Respond!

Remember the days when the Pinkerton Agency guarded stage coaches for Wells Fargo and others? Intrusion concerns were much simpler then. There was a physical asset to protect - gold!For most corporations, their data is now their greatest asset. How do you adequately protect your data? A study last year by Intel Security pointed to 43% of data lossbeing accidental leaks from internal employees!…