Security + Lee Waskevich + Jan 10, 2022
In part two of our trilogy, called Cyber Schmear of a Year, we explore one of the top trends of the year. No, not the cream cheese shortage… the wakeup call for companies regarding increased cyber liability insurance premiums and supplemental guidelines -- why it’s happening and what you can do to be prepared.
Security + ePlus Security Team + Dec 21, 2021
Everyone loves a good trilogy and we’re here to deliver. Over the next few weeks we’ll explore the threats, trends and tech that made 2021 what it was, as we look ahead and plan for what might be in store for 2022.
Security + Lee Waskevich + Mar 5, 2021
This is the first article in a three-part series: Achieve Zero Trust with Secure Access. Security philosophy has changed. The “trust but verify” approach is now obsolete—due in part to increased digitization, higher cloud adoption, and more distributed users—and it’s been replaced with a policy of zero trust. But building a zero trust security architecture is a multifaceted endeavor.
Security + ePlus Security Team + Mar 20, 2019
"Security by design" is at an inflection point as a result of advances in automation, orchestration, artificial intelligence and machine learning, says Lee Waskevich of ePlus Technology. In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Waskevich discusses: why security by design is at a critical turning point; leveraging automation, orchestration, AI and ML; and the need for changes in organizations' cultures.
Security + Paul Lenhard + Oct 17, 2018
We are now halfway through Cyber Security Awareness Month. While we all know that we can’t simply place emphasis on risk mitigation for only one month a year, this is a great time to give pause and think about where we are and where we want to go. Below are a few areas that we can spend some time reflecting on to ensure proper organizational security hygiene in order to maintain a strong, risk-aware culture.
Security + Russ Ortmann + Oct 11, 2018
Denying users administrative access to their local workstations is not often received well. As computers have become an integral part of our daily life, users often get upset and frustrated when they do not have the privileges to complete specific tasks. This frustration is usually felt in the IT department as well, both from disgruntled users that are complaining about their lack of access and also from the increased workload because the IT department now needs to complete any task that requires administrative access.
Security + Russ Ortmann + Sep 20, 2018
One of the more challenging aspects of cybersecurity is that the job is never done. New vulnerabilities, exploits, malware, and attacks are launched and discovered on a daily basis. According to Panda Security, an average of over 200,000 new malware samples are captured every day. With this continuous onslaught of new attacks coming every day, the security that defends an organization needs to be just as adaptable. In order to complete that mission, both the security technology that has been deployed and the professionals that deploy and operate it must be continually updating their ability to provide a robust security defense. Maintaining a current understanding of the cybersecurity world usually requires a significant investment of time, energy, and resources.
Security + Paul Lenhard + Jan 12, 2018
As most of you are aware by now, researchers have discovered a set of critical vulnerabilities in all Intel CPU hardware, currently impacting the vast majority of devices in the wild. These devices include desktops, servers, mobiles devices and appliances, regardless of Operating System and whether they are located in the cloud or on premises.
Healthcare + George Pashardis + Jul 10, 2017
According to International Data Corporation (IDC), IT spending is expected to reach $2.7 trillion worldwide in 2020. Financial services, manufacturing, and healthcare are expected to lead in spending. Among all industries, healthcare is projected to remain the fastest growing industry at 5.7% compound annual growth rate (CAGR).
Security + Lee Waskevich + Mar 16, 2017
Cloud adoption is increasing. While growth rate estimates vary, the trend is going up. But some studies reveal that cloud security remains a big concern, and it's having an impact on cloud services adoption. According to a study by Intel, 49% of customers said they slowed down their rate of adoption last year over security-related concerns, specifically citing a shortage of cybersecurity skills.
Security + Wayne St. Jacques + Feb 10, 2017
I talk about security a lot these days. It’s unavoidable, really. In my position, I meet and speak with so many IT people—colleagues, customers, and prospective customers—from commercial industry, healthcare, government, and education. And all of them share one similar concern: security.
Security + ePlus Security Team + Oct 14, 2016
SSL encryption is a vital tool in protecting data in flight. Transmitting sensitive data without modification is risky because if it is stolen, the data is in clear text and easily can be used by identity thieves. SSL encryption addresses this issue by using an encryption algorithm to encode the data before it is transmitted, protecting the data in transit by preventing it from being sent in clear text.
Security + John Reckner + Dec 2, 2015
Data is the life blood of nearly every business. But, what if something happened to that data or it fell into the wrong hands? Want to do analytics on your structured and unstructured data? Good luck if that data is lost, stolen, corrupted or sabotaged.
Security + Lee Waskevich + Oct 16, 2015
I speak to customers regularly about security, and one of the first questions I always ask them is, “What are the two most popular applications you use on a daily basis?” And the majority of the time, the answer I get is web and email.
Preparation and success go hand in hand.
Connect with us or use the form.
+1 888-482-1122