James Nagurney - National Business Development Manager
James Nagurney
National Business Development Manager
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
Vice President of Professional Services
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More

Security

We have searched the depths of our blog to provide you with the latest IT articles on Security. Get Connected Today!

What's the Deal with Windows 10?

Get the Scoop on the Latest from Microsoft

by James Nagurney | 10.23.14

The biggest news coming out of Microsoft this month is the announcement about Windows 10.  We have to be honest that the name is a bit of a surprise. We were expecting Windows 9 or just “Windows” (you know, like “iPad”), but they got us on this one. Apparently, Microsoft is signifying that this will be their final “major” release of their flagship product, with the future bringing on evolutionary, in-place tweaks and modifications. This is probably a smart move as most customers are prone to skipping versions, at least for the last 15+ years or so. Here’s what we know so far:

Tags:ApplicationsiPadLicensingMicrosoftSecurityWindows 7Windows 8Windows Server 2003Windows XP

Risk Assessment

Don’t Short-Change Your Risk Assessment

Special Risk Circumstances

by Stephen Nardone | 10.21.14

While there are commonalities to most risk assessments, companies in regulated industries that store sensitive customer data must follow additional government-mandated protocols. The overall goal is to gain an understanding, from an end-to-end perspective, of what the current risk is to your environment. However, a full Security Assessment can be targeted against compliance-related areas, like PCI or HIPAA.

Tags:BYODCloudComplianceDataDeviceSecurity

Can Your Technology Stand Up to a Barrage of New Security Threats?

Keep Your Network Strong with Dell SonicWALL

by Bill Virtue | 10.16.14

Today, addressing security risk and threats is an ongoing rapid process. Organizations of all sizes need to protect themselves from the constant evolution of threats. My team at PC Connection is working with customers every day to eliminate dangerous gaps in protection and boost employee productivity at the same time.

Tags:Dell SonicWALLNetworkingPC ConnectionSecurity

Risk Management Process

Any competent IT professional will tell you that one of their top priorities— probably the top priority—is securing their enterprise’s data and network. Indeed, CIOs typically allocate a healthy chunk of their overall IT budgets to security.

Concern, however, does not always translate into competence, or even common sense. Further, throwing money at a problem without first properly assessing and prioritizing an enterprise’s unique IT-related risks actually can create greater vulnerability. You can’t just buy technology, put it in your environment, and assume that your assets are safe.

Tags:DataNetworkingSecurity

The ‘Other’ CIA – Part of Achieving a Secure Storage Infrastructure

Plan, Audit, Integrate, Test — Keys to Storage Security

by Kurt Hildebrand | 10.01.14

In an era when data breeches can cost hundreds of millions of dollars, having a secure storage system is critical.

Tags:Cloud StorageDataSecurityStrategy

Follow Us
RSS Feed
Featured Bloggers
Director of Practices and Initiatives for Enterprise Storage
James Nagurney - National Business Development Manager
National Business Development Manager
Lane Shelton - Vice President of Software Business Development
Vice President of Software Business Development
Tag Cloud
Loading Loading...