Posted on April 25, 2018 by Gento | Comments (11)
The 2017 Data Breach Investigations Report (DBIR) revealed that 51 percent of breaches involved the use of malware. Of these breaches, 66 percent were initiated via phishing campaigns that used malware infected email attachments. As discussed in Part 1: Configuration Is the Biggest Security Threat, there are five steps that businesses need to take to mitigate configuration security risks. These steps include: endpoint protection, strong passwords, a restricted number of login attempts, alternative authentication, and limited access to critical systems. Upon completing these steps the next task will be to ensure that all devices, communications, logging, and vulnerability responses are properly configured to create a secure network for your vital business data.
Posted on March 28, 2018 by Gento | Comment (1)
The rise in cyberattacks and ransomware thefts has caused businesses to shore up their IT infrastructure defenses. While the boost in security protocols is a step in the right direction, many businesses are unaware of a key threat -- improperly configured IT devices and systems. For example, postponing or altogether forgetting to change a default password can leave your vital business data ripe for the taking.
Posted on March 15, 2018 by Gento | Comments (11)
Just a few years ago there were roughly 15 billion devices connected to the IoT, or "Internet of Things". By 2020, that number is expected to grow to 30.7 billion - representing about $1.29 trillion across all markets. Countless products - from industrial sensors, workspace management applications, to wearable devices - are all connected to the internet, and to each other. This is allowing them to create and share valuable data every second of the day.
Posted on March 6, 2018 by Gento | Comments (9)
Enterprises have been using server virtualization to consolidate their IT footprint for years, but smaller organizations often experience difficulty in adopting this architecture for their IT infrastructure. Guidance on this process is especially important for small to medium-sized businesses (SMBs), which have limited resources for designing, implementing and managing their infrastructure.
The challenges that SMBs face in virtualizing their data center include the following:
Posted on February 23, 2018 by Gento | Comments (6)
According to the Gartner research company, the number of devices with wireless internet connectivity is expected to approach 21 billion by the year 2020. That places the average person, globally, in possession of roughly 1.6 wireless devices. In the west, the estimate per person is four to five such devices. This is the Internet of Things (IoT), and the one thing that’s certain is you will have a potentially unlimited number of tech vendors vying for your attention, information, and money.
The first thing we should understand in this coming sea of connectivity is the rights of customers. As a customer in the IoT world you will have the right to;