Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC, Solutions and Services
»See All Authors

Security

We have searched the depths of our blog to provide you with the latest IT articles on Security. Get Connected Today!

Retailers' Increased Cyber Security Budgets

The New Cost of Doing Business

by Jennifer Ramstrom | 11.21.16

Like nearly every business today, retail and consumer companies are under siege from a near-constant barrage of phishing emails, SQL injections, insider attacks, and other nefarious cyber threats.

We’ve all read about the high-profile attacks—like a massive security failure in 2015 when cyber criminals accessed the personal data of up to 15 million individuals, including names, addresses, Social Security numbers, birthdates, and more.

Tags:BiometricsConnectioncyber threatsCyber-attacksITphishing emailsRetailSecuritySQL

Printer

Your New IT Hard Target: Printer Security

Hackers Can Target More than Your PCs

by Jane Garrity | 11.11.16

Printers being hacked is nothing new. It’s even hit the headlines a few times with one being used to store pirated files, then another being programmed to display a paperclip on every page it printed. It seemed harmless at first. But then Columbia University discovered you could actually cause a printer’s fuser to continually heat up, potentially burning up more than your maintenance budget.

Tags:HPHP Access ControlJetAdvantageNetworkPrinterSecuritySecurity SolutionsSoftwareVideo

Network Printer

Printers as a Security Threat

You’ll Never Look at the Paper Tray the Same Way

by Jane Garrity | 11.07.16

In today’s digital age, everybody knows just how important security is. We look at PCs and smartphones—and the valuable data they hold—and immediately understand how rich a target those devices are to cyber criminals. We know the threat is real. But with so much focus on the data center, on storage, on mobile devices…are organizations today overlooking a key weakness?

Tags:cybercriminalsData CenterDigitalHardwareHPPodcastPrinterSecuritySoftwareSureStart BIOS

The Threat Among Us

What to Include in Your Insider Threat Programs

by Stephen Nardone | 10.31.16

Not all employees and third party vendors are potential threats, but having a program in place to detect and respond to insider threats will strengthen security and protect an organization’s assets.

Tags:Cyber AwarenessCyber SecurityCyber-attacksEmployeesSecurityTechnical Data

Our Continuously Connected Lives: What’s Your ‘App’-titude?

Changing Your Attitude about Application Security

by Stephen Nardone | 10.28.16

With the continued evolution of IoT devices and the rapid pace of software innovation, everyone needs to change their ‘app’-titude around security.

One of the most important themes for National Cyber Security Awareness aims to bring security to front of mind for both application developers and security practitioners who need to be more consistent with updates and patches.

Tags:ConnectionIoT DevicesISPALMSNational Cyber Security Awareness MonthSecuritySecurity InnovationSoftware

Subscribe
Follow Us
RSS Feed
Featured Bloggers
Stephen Nardone - Director of Security Solutions and Services
Practice Director, Security and Mobility
Jennifer Ramstrom - VP Vertical Strategy and Business Development
VP Vertical Strategy & Business Development
Kevin O'Connor - Senior Director, Cloud Solutions Group
Senior Director, Cloud Solutions Group
Tag Cloud
Loading Loading...