James Nagurney - National Business Development Manager
James Nagurney
National Business Development Manager
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
Vice President of Professional Services
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More

IT Security News

The latest news and technology solutions to improve your company’s security infrastructure. Read articles, case studies, expert reports, and more to gain a better understanding of your current security-focused infrastructure and learn how to meet the needs and challenges of today’s changing security landscape. We’ll keep you Connected with our IT Security News.


Top Four Essentials for Your Security Policy

Don’t Get Caught without These

by Stephen Nardone | 10.30.14

In an era when security threats morph daily and compliance regulations get more complex every year, creating a solid and up-to-date security program is crucial. Here’s how to do it.

To be worth its salt, a good security program must cover your organization end-to-end and line up with your company’s risk management strategy, and provide all the necessary standards, guidelines, and policies to enforce the program. It must also be flexible enough to incorporate ongoing revisions and updates. And it must be enforceable—otherwise, it’s just an object of employee derision and a waste of time.

Tags:CloudComplianceSecurityServersStorage

Few things are more important to your company than the protection and proper management of data. Just as you wouldn’t hand over the keys to your home to a total stranger, you shouldn’t entrust your company’s information systems to a third party without thoroughly vetting them. Here are some of the important qualities to look for.

Tags:ComplianceDataNetworkingSecurity

Risk Assessment

Don’t Short-Change Your Risk Assessment

Special Risk Circumstances

by Stephen Nardone | 10.21.14

While there are commonalities to most risk assessments, companies in regulated industries that store sensitive customer data must follow additional government-mandated protocols. The overall goal is to gain an understanding, from an end-to-end perspective, of what the current risk is to your environment. However, a full Security Assessment can be targeted against compliance-related areas, like PCI or HIPAA.

Tags:BYODCloudComplianceDataDeviceSecurity

Can Your Technology Stand Up to a Barrage of New Security Threats?

Keep Your Network Strong with Dell SonicWALL

by Bill Virtue | 10.16.14

Today, addressing security risk and threats is an ongoing rapid process. Organizations of all sizes need to protect themselves from the constant evolution of threats. My team at PC Connection is working with customers every day to eliminate dangerous gaps in protection and boost employee productivity at the same time.

Tags:Dell SonicWALLNetworkingPC ConnectionSecurity

Risk Management Process

Any competent IT professional will tell you that one of their top priorities— probably the top priority—is securing their enterprise’s data and network. Indeed, CIOs typically allocate a healthy chunk of their overall IT budgets to security.

Concern, however, does not always translate into competence, or even common sense. Further, throwing money at a problem without first properly assessing and prioritizing an enterprise’s unique IT-related risks actually can create greater vulnerability. You can’t just buy technology, put it in your environment, and assume that your assets are safe.

Tags:DataNetworkingSecurity

Follow Us
RSS Feed
Featured Bloggers
Director of Practices and Initiatives for Enterprise Storage
James Nagurney - National Business Development Manager
National Business Development Manager
Lane Shelton - Vice President of Software Business Development
Vice President of Software Business Development
Tag Cloud
Loading Loading...