James Nagurney - National Business Development Manager
James Nagurney
National Business Development Manager
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
Vice President of Professional Services
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More
Stephen Nardone - Director of Security Solutions and Services

Stephen Nardone

Stephen is Director of Security Solutions and Services at
PC Connection with over 34 years of experience in both the government side and the commercial side of the security business. 

Areas of expertise:Security

Articles by Stephen Nardone


Top Four Essentials for Your Security Policy

Don’t Get Caught without These

by Stephen Nardone | 10.30.14

In an era when security threats morph daily and compliance regulations get more complex every year, creating a solid and up-to-date security program is crucial. Here’s how to do it.

To be worth its salt, a good security program must cover your organization end-to-end and line up with your company’s risk management strategy, and provide all the necessary standards, guidelines, and policies to enforce the program. It must also be flexible enough to incorporate ongoing revisions and updates. And it must be enforceable—otherwise, it’s just an object of employee derision and a waste of time.

Tags:CloudComplianceSecurityServersStorage

Few things are more important to your company than the protection and proper management of data. Just as you wouldn’t hand over the keys to your home to a total stranger, you shouldn’t entrust your company’s information systems to a third party without thoroughly vetting them. Here are some of the important qualities to look for.

Tags:ComplianceDataNetworkingSecurity

Risk Assessment

Don’t Short-Change Your Risk Assessment

Special Risk Circumstances

by Stephen Nardone | 10.21.14

While there are commonalities to most risk assessments, companies in regulated industries that store sensitive customer data must follow additional government-mandated protocols. The overall goal is to gain an understanding, from an end-to-end perspective, of what the current risk is to your environment. However, a full Security Assessment can be targeted against compliance-related areas, like PCI or HIPAA.

Tags:BYODCloudComplianceDataDeviceSecurity

Risk Management Process

Any competent IT professional will tell you that one of their top priorities— probably the top priority—is securing their enterprise’s data and network. Indeed, CIOs typically allocate a healthy chunk of their overall IT budgets to security.

Concern, however, does not always translate into competence, or even common sense. Further, throwing money at a problem without first properly assessing and prioritizing an enterprise’s unique IT-related risks actually can create greater vulnerability. You can’t just buy technology, put it in your environment, and assume that your assets are safe.

Tags:DataNetworkingSecurity

Modern Security Defined

The indisputable components of a good plan

by Stephen Nardone | 07.17.14

If you think you can put together a top-notch security plan, roll it out, and relax, think again. The best advice I can give anyone concerned with security is to abolish the “set it and forget” mentality. Look around; I doubt you can find that one locked room, with the one mainframe, where all your data is stored. In today's world—as security threat changes daily —organizations need to address this moving target with a well-defined security risk management strategy.

Tags:AssessmentComplianceData CenterEnterprise AgreementManagementSecurity