Clinton email controversy sparks conversations about data security

Zack Nimtz

The recent controversy highlighting Hillary Clinton's use of personal email for work, and potentially put confidential government information at risk, has sparked conversations around the world about the importance of cyber security. Despite conflicting views and opinions about the controversy itself, one thing everyone can agree upon is that businesses, no matter what size they are, need to protect their confidential information from potential security threats.

"Hillary Clinton's use of a private email system rather than a government-run account while serving as Secretary of State has raised questions about what rules she may have broken, whether she knew she was in violation, and who else knew about her private system," wrote ABC News contributors Meghan Keneally, Liz Kreutz and Shushannah Walshe.

Read More
Topics: Bring Your Own Device, Managed Network Services, Network Security, Security, Mobile

2014 may be remembered as 'year of the data breach'

Zack Nimtz

A recent Forbes report highlighting noteworthy incidents of the past 12 months, indicated business professionals believe 2014 was the year of the data breach.

"While 2013 was a bad year for IT security, there's no disputing that 2014 was the worst," explained Kevin Jones, senior IT security architect at Thycotic, as quoted by Forbes. "Whether it was insider threats, anonymous or nation-state hackers, 2014 was a bad year for anyone whose job is to protect sensitive data from unsanctioned access."

Read More
Topics: Network Security, Security

Closing out 2014 with our top 5 most popular posts

Zack Nimtz

With 2015 only hours away, we thought it would be a good opportunity to highlight our top five most popular posts of 2014. We hope you've enjoyed following our blog posts throughout the year and look forward to providing you with more technology-related posts in the New Year!

Top 5 Posts of 2015

1. The Fallacy of Planning

The Fallacy of Planning discusses the importance of iterative planning when it comes to large technology projects such as custom development.

Excerpt: With iterative planning, there are very few surprises by the end of the project. There may be some smaller ones during the project, but you can rest assured there won’t be any big ones at the end. Sometimes, the end result is totally different than what was originally envisioned, but that’s a good thing! Read more...

Read More
Topics: Microsoft Azure, Cloud Services, IT Services, Microsoft Dynamics GP, Development, Network Security

US organizations most committed to cyber security

Zack Nimtz

Cyber security may be impacting companies worldwide, but certain countries are more committed to improving corporate safeguards than others. ABI Research's latest Global cyber security Index (GCI) report named the United States as the most dedicated to this cause, followed by Canada.

The GCI is based on five benchmarks, including cooperation, capacity building, legal initiatives, technical measures and organizational strategies. The goal of the index is to promote a culture based on communication and information.

"The GCI represents a significant step forward not only in terms of international cooperation and public-private partnership, but also in promoting the importance of cyber security at the global level. The project can only benefit from increased collaboration and we are pleased that the GCI will find a 2.0 iteration," noted ABI Research Practice Director Michela Menting.

Read More
Topics: Managed Network Services, Network Security, Security

"CryptoLocker" Ransomware Virus a Real Threat

Butch Whitmire

At least one of our clients has fallen victim to a new ransomware virus called "Cryptolocker" which is being transmitted through a false, "customer complaint" email. This email contains a Trojan downloader as an attachment. Once it is delivered, the virus seizes and encrypts users' files. Cyber ransomers then demand money to unencrypt your files. (Probably not likely after you send them money.) The only known option at that point is to wipe and restore.

Read More
Topics: Network Security, Security