Third-Party Access Vulnerabilties—Security's Weakest Link
High-profile security breaches caused by third-party access vulnerabilities have led to increased scrutinizing of internal access controls by IT leadership and executives. The risks associated with data leakage can extend far beyond the value of the compromised data to include financial penalties and even long-term damage to a brand. Businesses need to take a comprehensive approach to third-party access and management.
The MSP Opportunity-as-a-Service
Managed services have evolved to include everything from desktops to data centers, and from disaster recovery to application delivery. The cloud and a shift towards the consumption economy is ushering in a massive opportunity for MSPs to grow revenues and increase operating margins through innovative new managed services.
Analyst Perspective: Healthcare Compliance And Active Directory
Pertino's Josh Grose talked with Tod Ferran, IT Security Auditor, CISSP and QSA at SecurityMetrics, about the state of HIPAA and PCI and the role Active Directory can play in achieving compliance.
Top 3 Networking Trends for 2015
A confluence of technological and IT trends relating to mobile and cloud are creating dramatic changes in how and where people work, computing workloads are processed, and work applications are delivered. What these changes all have in common is that they make businesses more dependent than ever on the Internet as their WAN—an inherently best effort infrastructure with limited visibility, security and control. This effect of mobile and cloud on IT and the elevation of the best effort Internet to business critical status are poised to transform networking in 2015.
Don’t Get XPloited: Mitigating Network Security Risk for Mobile Workers
Your XP migration plan should not only include the particulars of a new operating system, applications and utilities, but it’s also a good time to retire that decade-old VPN client.