Secure your passwords now

For years, we’ve been told that strong passwords include three things: upper and lower-case letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? Here’s why and how it involves you.

Read more

Data – Valuable Asset or Business Risk?

Commerce is built on the concept of the value chain. The notion that you can take something of relatively little worth and, through various processes, increase its value is fundamental to a sustainable global economy. And, in the early part of the 21st century, it is “data” that gives rise to perhaps the most significant contemporary […]

Read more

Shifts in Legislative Compliance and Its Impact to Enterprise IT

The motivational saying “Keep Calm and Carry On” does not apply to enterprise IT professionals. Not anymore, unless they have their data protection and data risk management strategies worked out. Enterprise IT is facing persistent challenges to protect their data and secure their data center against cyberattacks and ransomware.

Read more

Making the Case for Network Automation in Higher Education

Network automation allows IT teams to provision services instantly. This will become increasingly important as big data, analytics, machine learning and artificial intelligence make their way onto campus networks.  Once connected, billions of devices will be producing huge amounts of data.

Read more

Digital Evidence Storage Needs Grow

Police departments today process a tremendous amount of video footage as evidence of crimes, which includes managing and storing data and ensuring it is court admissible. Further, storage requirements for surveillance and body-worn camera data differ widely from state to state, depending on the crime.

Read more

Website Bugs. Who On Your Team Swats Them?

Do you have a “bug doctor” in the house? Not the kind that chases flying and crawling insects, but the person who finds the “bugs” on your website. If you don’t you could end up like Equifax did recently, after they already had a major privacy breach just a few months ago.

Read more

Three Major Health IT Moves Taking Shape in 2017

As always, evolving technology and innovation continues to drive healthcare transformation, but there are a few that have become established movements in changing the healthcare landscape over this past year. 1. Data: From Acquisition To “Appification” The data lifecycle—taking raw data to innovation—is speeding up, bringing us closer to the promise of evidence-based medicine.

Read more

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: […]

Read more