eSights: Blog

eSights: Blog

ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.


  • Facial Recognition Systems

    • Marc Cohen
    • Aug 8, 2019
    Every technology has its place, and the people that use the systems have a responsibility to society to ensure the systems are not misused, and data captured is handled appropriately. Technology giants have acknowledged this and called for government regulation of face recognition technologies due to their far-reaching impacts.
    Continue Reading >
  • The Role of Network Access Controls in Healthcare Mergers

    • ePlus Security Team
    • Jun 4, 2019
    Healthcare systems and providers have been seeking ways to increase efficiency and productivity while embracing value-based care models and enabling patient empowerment. Efforts to make these goals a reality have manifested in two ways: the adoption of new tools and technology and through mergers and acquisitions.
    Continue Reading >
  • Three Features that Enable NAC Solutions to Secure Healthcare Networks

    • ePlus Security Team
    • May 16, 2019
    With recent advancements in technology, the healthcare space is changing. Specifically, new applications and connected devices are being developed to improve productivity and patient access to medical information. This is known as the consumerization of IT, in which technology tools and solutions focus on empowering the end user. In healthcare, this means the patient or physician.
    Continue Reading >
  • Demystifying Cloud Security

    • Jeff McCardel and Sam Curcio
    • Apr 30, 2019
    An increasing number of organizations are investigating options to migrate workloads to the cloud or replace legacy applications with a software as a service (SaaS) application. Moving assets from on-premise to the public or private cloud can enable substantial positive business outcomes but requires additional thought around how to protect sensitive information to maintain compliance, audit and privacy requirements.
    Continue Reading >
  • An Interview from the Road: RSA Conference 2019

    • Marc Cohen | Jason Nelson
    • Mar 28, 2019
    Read more as we talk with our team on the ground at this year’s RSAC. ePlus Lead Security Engineer Jason Nelson attended sessions, and Marc Cohen, ePlus Solutions Director walked the floor, saw the demos and talked the talk!
    Continue Reading >
  • The Growing Importance of 'Security by Design'

    • ePlus Security Team
    • Mar 20, 2019
    "Security by design" is at an inflection point as a result of advances in automation, orchestration, artificial intelligence and machine learning, says Lee Waskevich of ePlus Technology. In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Waskevich discusses: why security by design is at a critical turning point; leveraging automation, orchestration, AI and ML; and the need for changes in organizations' cultures.
    Continue Reading >
  • California Data Privacy Bill: What You Need to Know

    • Sophat Chev
    • Feb 7, 2019
    The first data breach of 2019 took place less than 24 hours after the new year. The Australian State of Victoria reported an estimated 30,000 civil identities exfiltrated by way of spear phishing (using email to lure its victim to initiate a vulnerability). The agency claims all personal identifiable information (PII) was encrypted, which thankfully renders the data exfiltrated unusable. This security approach was a result of a compliance effort to meet the GDPR requirement for encrypting all PII data.
    Continue Reading >
  • Reduce Your Attack Surface with an IoT Security Strategy

    • Christopher Williams
    • Jan 24, 2019
    There is no doubt that the world of the Internet of Things (IoT) is here to stay. Consumer grade products such as TVs, speakers, toys, wearables, appliances and much more continue to flood the retail space offering enticing features to consumers. Learn how to reduce your attack surface with an IoT security strategy.
    Continue Reading >
  • SamSam Ransomware: How ePlus Helps Mitigate Threats

    • Marc Cohen
    • Jan 10, 2019
    In early December, the Department of Homeland Security (DHS), the National Cybersecurity and Communications Integration Center (NCCIC), and the Federal Bureau of Investigation (FBI) issued an alert regarding SamSam ransomware. Threat actors exploit Windows servers to gain persistent access to a victim’s network, utilizing SamSam to infect all reachable hosts.
    Continue Reading >
  • Stay Secure During the Holidays

    • Paul Lenhard
    • Dec 4, 2018
    As 2018 comes to an end, threat actors continue to drive campaigns in hopes of catching shoppers, and the industry, off guard. With the increase in IoT devices for both personal and business use, we must ensure we remain protected while we ourselves, or our employees, are online.
    Continue Reading >
  • Ensuring a Risk-Aware Culture, Year-Round

    • Paul Lenhard
    • Oct 17, 2018
    We are now halfway through Cyber Security Awareness Month. While we all know that we can’t simply place emphasis on risk mitigation for only one month a year, this is a great time to give pause and think about where we are and where we want to go. Below are a few areas that we can spend some time reflecting on to ensure proper organizational security hygiene in order to maintain a strong, risk-aware culture.
    Continue Reading >
  • CSC 5: Controlled Use of Administrative Privileges

    • Russ Ortmann
    • Oct 11, 2018
    Denying users administrative access to their local workstations is not often received well. As computers have become an integral part of our daily life, users often get upset and frustrated when they do not have the privileges to complete specific tasks. This frustration is usually felt in the IT department as well, both from disgruntled users that are complaining about their lack of access and also from the increased workload because the IT department now needs to complete any task that requires administrative access.
    Continue Reading >
  • CSC 4: Continuous Vulnerability Assessment and Remediation

    • Russ Ortmann
    • Sep 20, 2018
    One of the more challenging aspects of cybersecurity is that the job is never done. New vulnerabilities, exploits, malware, and attacks are launched and discovered on a daily basis. According to Panda Security, an average of over 200,000 new malware samples are captured every day. With this continuous onslaught of new attacks coming every day, the security that defends an organization needs to be just as adaptable. In order to complete that mission, both the security technology that has been deployed and the professionals that deploy and operate it must be continually updating their ability to provide a robust security defense. Maintaining a current understanding of the cybersecurity world usually requires a significant investment of time, energy, and resources.
    Continue Reading >
  • Breach Series - Part Three: Is Your Supply Chain Putting Your Systems or Data at Risk?

    • ​Lee Waskevich
    • Aug 24, 2018
    If you were a hacker, how would you infiltrate a well-protected target? How would you get inside an organization that has a solid security framework and has invested millions in cyber security?
    Continue Reading >
  • Breach Series - Part Two: Cyber Criminals are Assaulting the Retail Sector—Don’t Be the Next Victim

    • ​Lee Waskevich
    • Aug 15, 2018
    Data breaches in the retail sector are well-known and widely covered by the media—we all remember hearing about Target, Home Depot, and TJ Maxx. But with recent breaches at Panera Bread and Hudson’s Bay Company (owners of Saks Fifth Avenue and Lord & Taylor), we see that retail will continue to be a popular and prevalent target for cyber thieves. To avoid becoming the next victim, you must remain diligent and take action now.
    Continue Reading >
  • Breach Series - Part One: Follow These Steps to Avoid Becoming a Victim to Ransomware

    • ​Lee Waskevich
    • Aug 8, 2018
    Ransomware attacks hit us hard in 2017. SamSam, WannaCry, NotPetya, and other variants infected computers around the world, locking up systems, disrupting operations, and of course, extorting large sums of money from victims
    Continue Reading >
  • Data Loss Prevention in Healthcare

    • George Pashardis
    • Aug 7, 2018
    As an industry with strict privacy and security regulations, healthcare is challenged to implement increased cybersecurity measures to mitigate current threats. Failure to protect confidential information can result in fines amounting to millions of dollars. So whether you’re an IT security professional or the CIO of a hospital, medical university, health clinic, insurance company or a third-party organization involved in the industry, a robust Data Loss Prevention strategy should be a critical part of your security program.
    Continue Reading >
  • What you need to know about social media and IT security

    • Justin Bodie
    • Jun 21, 2018
    With Facebook and data privacy in the news recently, it’s a great time to think about reviewing your social media presence. As you probably realize, everything you click on, like, or tweet is recorded. Assume it’s there forever, and the information could be made available to both authorized and unauthorized users or services.
    Continue Reading >
  • What I Learned at HIMSS18: The Hottest Topics in Healthcare IT

    • George Pashardis
    • Jun 13, 2018
    When you bring together more than 40,000 professionals, clinicians, executives and vendors from around the world, a massive amount of information gets shared. Too much to digest all at once. So in the three months since HIMSS18, I’ve taken time to really think about what I saw and heard.
    Continue Reading >
  • IoT & Consumer Gear Attacks on the Rise…

    • ​Lee Waskevich
    • May 30, 2018
    Imagine pulling an ordinary “average joe” off the street and placing him into an NFL playoff game. No football experience, no safety equipment, and no workout regime. What would you expect to happen? That’s about where we stand with the majority of our home internet gateways.
    Continue Reading >

Want to Learn More?

We have proven success engineering and deploying solutions that enable our customers to thrive in today's constantly changing, complex technology landscape.

 

LET'S GET STARTED