More Perspective

ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.

  • Are You Prepared to Meet the Next Benchmark in the New NYS DFS Cyber Security Regulations?

    • Paul Lenhard
    • Oct 4, 2017
    March 1, 2017 marked the date in which the NYS Department of Financial Services announced their compliance requirements for all covered entities that do business in New York State
    Continue Reading >
  • Navigating the World of Advanced Endpoint Protection

    • Bill Wheeler
    • Sep 21, 2017
    Ever feel like you’re fighting a losing battle? Your organization is pretty diligent when it comes to security. You have firewalls at the perimeter between your internal networks and the Internet. You have an anti-virus product deployed on every laptop, desktop, and server within your organization and the updates are kept current. You may have even deployed an application-aware next generation firewall, an IPS, or a SEIM/SEIM to collect and correlate security events from many data sources. Yet, despite your best efforts, your end users still manage to become infected with malware—or perhaps even ransomware. You may ask yourself, “With all of this protection in place, how is this possible?”
    Continue Reading >
  • Et Tu, Equifax? Navigating IT Security and Keeping Your Personal Data Safe

    • Justin Bodie
    • Sep 12, 2017
    The world is changing rapidly, and we’re starting to see cracks in the security controls we’ve come to rely on in our digital society. Even Equifax, one of the largest credit reporting organizations out there, has suffered a data breach. I’m often asked by friends and family how I react to the news and what I recommend, so I thought I’d share my suggestions with you
    Continue Reading >
  • 10 Considerations to Build Strong Security Programs in Education

    • John Otte
    • Sep 11, 2017
    Information security is a top concern in every industry. In 2015, the percentage of reported data breaches caused by hacking incidents increased 8.4 percent over 2014 numbers to reach the highest value in nine years (37.9 percent), according to a report from the Identity Theft Center. Cyber crime is a sophisticated criminal enterprise, and billions are lost annually through breaches of businesses, healthcare organizations, and government entities; and yes, educational institutions too.
    Continue Reading >
  • Can’t Find Cyber Security Talent? Try These 5 Things

    • Tom Bowers
    • Aug 15, 2017
    According to a recent survey by Enterprise Storage Group (as reported in this Network World article), 45% of organizations reported a “problematic shortage” of cyber security skills, representing a 17% increase from their 2015 survey results. The shortage of skills creates a problem. But the obstacle is not insurmountable. Despite the talent shortage, here are five things you can do to find resources and build an effective cyber security program.
    Continue Reading >
  • Connecting Cloud and Security in the Digital Age

    • ​Lee Waskevich
    • Mar 16, 2017
    Cloud adoption is increasing. While growth rate estimates vary, the trend is going up. But some studies reveal that cloud security remains a big concern, and it’s having an impact on cloud services adoption. According to a study by Intel, 49% of customers said they slowed down their rate of adoption last year over security-related concerns, specifically citing a shortage of cybersecurity skills.
    Continue Reading >
  • Optimize Your Security Program with Managed Security Services

    • Wayne St. Jacques
    • Feb 10, 2017
    I talk about security a lot these days. It’s unavoidable, really. In my position, I meet and speak with so many IT people—colleagues, customers, and prospective customers—from commercial industry, healthcare, government, and education. And all of them share one similar concern: security.
    Continue Reading >
  • New Cybersecurity Regulations Soon to Take Effect in New York. Is Your Company Ready?

    • Tom Bowers
    • Jan 12, 2017
    New cybersecurity regulations go into effect for financial services companies in the state of New York on March 1, 2017. And the time to act is now.
    Continue Reading >
  • Ransomware Attacks on the Rise. Take Steps Now to Avoid Being a Victim.

    • Tom Bowers
    • Jan 6, 2017
    Ransomware attacks are increasing. And it’s costing U.S. companies millions to extract themselves from the clutches of these blackmailers—to the tune of $209 million in the first three months of this year, according to information provided to CNN by the Federal Bureau of Investigation (FBI).
    Continue Reading >
  • Worried About Insider Threats? Bolster Your Defenses with User Behavior Analytics

    • Tom Bowers
    • Jan 6, 2017
    Beware of the insider threat. For those of us in information security, those words represent sage advice we’ve heard (and given) for years. Long before Eric Snowden and the incident involving the National Security Agency (NSA) hit the headlines.
    Continue Reading >
  • Malware Slipping through Your AV Defenses? Endpoint Detection and Response Solutions Can Help

    • Tom Bowers
    • Dec 13, 2016
    If you work in the area of IT security—or manage teams of people who do—I bet you’ve heard these statements before (or something similar): We’re constantly battling malware. Although we keep our antivirus software up to date, malware continues to get through. What else can we do?
    Continue Reading >
  • Mitigate Business Risk with a Next-Generation Data Center Firewall

    • Tom Bowers
    • Oct 14, 2016
    Your business depends on applications and data. In today’s digital age, both are vital assets, and protecting them against cyber attacks is essential. But as you know, staying ahead of cyber threats is a never-ending job, and one that seems to get more difficult every day.
    Continue Reading >
  • Avoid the Dreaded SSL Encryption Blind Spot

    • Tom Bowers
    • Oct 14, 2016
    SSL encryption is a vital tool in protecting data in flight. Transmitting sensitive data without modification is risky because if it is stolen, the data is in clear text and easily can be used by identity thieves. SSL encryption addresses this issue by using an encryption algorithm to encode the data before it is transmitted, protecting the data in transit by preventing it from being sent in clear text.
    Continue Reading >
  • Is Your Security Program Effective Against Today’s Advanced Threats?

    • John Otte
    • Sep 30, 2016
    Cyber crime is a sophisticated criminal enterprise, and billions are lost annually through breaches of businesses, healthcare organizations, and government entities; and yes, educational institutions too.
    Continue Reading >
  • Leverage Advanced Threat Intelligence and Machine Learning with Next-Generation Security Platforms

    • Tom Bowers
    • Aug 5, 2016
    Without question, today’s threats are more sophisticated than their predecessors. Cyber criminals have become experts at utilizing innovative techniques and social engineering to breach common layered-security defenses, implanting malware throughout corporate networks and stealing information.
    Continue Reading >
  • Guard Against Advanced Persistent Threats Through Internal Segmentation

    • Tom Bowers
    • Jun 3, 2016
    In 2015, the number of zero-day vulnerabilities discovered increased 125 percent from the year before, according to data compiled by Symantec. In addition, massive data breaches were again reported last year, resulting in an estimated 429 million identities exposed to cyber villains. That’s a huge number.
    Continue Reading >
  • Securing Mobile Apps Requires Discipline and Patience

    • Heather Axworthy
    • Apr 15, 2016
    Sales of smartphones totaled 1.2 billion units in 2014. We can all agree that is no real surprise. Ours is a society increasingly on the move. And these devices help to improve our productivity, both personally and professionally, and to satisfy our basic human need for instant gratification.
    Continue Reading >
  • Don't Overlook the Biggest Threat of All

    • Tom Bowers
    • Mar 18, 2016
    The biggest threat to your company’s information security could be sitting two cubicles away from you. Make no mistake. Outside threats are real and shouldn’t be ignored. But the greatest risk to enterprise information security today is the insider threat.
    Continue Reading >
  • It's All About the Data And Keeping It Secure

    • John Reckner
    • Dec 2, 2015
    Data is the life blood of nearly every business. But, what if something happened to that data or it fell into the wrong hands? Want to do analytics on your structured and unstructured data? Good luck if that data is lost, stolen, corrupted or sabotaged.
    Continue Reading >
  • Content Security - It's Not Just for Spam Anymore

    • ​Lee Waskevich
    • Oct 16, 2015
    I speak to customers regularly about security, and one of the first questions I always ask them is, “What are the two most popular applications you use on a daily basis?” And the majority of the time, the answer I get is web and email.
    Continue Reading >