The Perils of IT Security Services Profitability

Posted by Mike Vizard on Oct 20, 2014 8:00:00 AM

Providing IT security has never been an activity for the feint of hearts, which is one of the primary reasons that many IT services firms are reluctant to engage in providing IT security unless they really specialize it.

Read More

Topics: IT Security, Cyber Security

Don't overlook insider cyber security threats

Posted by Alan Earls on Oct 13, 2014 8:30:00 AM

In continuing to focus on IT security related topics, in conjunction with National Cyber Security Awareness Month, it makes sense for businesses to stop and “look in the mirror.” While there is tremendous attention given to the outside security threats such as hackers and advanced persistent threats (APTs), the potential damage that insiders can do is sometimes overlooked. And, according to experts, while the threat may be technological, the solution is at least partly “human.”  

Read More

Topics: IT Security, Cyber Security

Gartner CIO priorities survey finds IT security is low on the list

Posted by Ron Miller on Oct 9, 2014 2:23:18 PM

I spied the the latest Gartner CIO priorities list the other day on Twitter. No surprise that business analytics (aka big data) was at the top, but perhaps what was a surprise was that security was at the bottom. Assuming this list is order of priority, that's actually shocking, especially in the context of the number high profile IT security breaches we've seen in recent years -- and the standard anti-cloud argument from some CIOs and IT pros that usually involves security and how much better they can do it themselves.

Read More

Topics: IT Security, Cyber Security

The Windows Server Migration Challenge

Posted by Mike Vizard on Sep 24, 2014 8:30:00 AM

Microsoft and its partners in theory need to upgrade 20,000 instance of Windows Server 2003 a day to meet the July 2015 deadline that Microsoft has set for ending support. Obviously, that’s not going to happen. But what most IT service providers might not appreciate is that their only option is to upgrade those instances of Windows Server to Windows Server 2012 R2. That’s because Microsoft is also moving to pull Windows Server 2008 from the IT services channel by the end of this year.

Read More

Topics: IT Security

Law firms have particular BYOD security, management needs

Posted by Naomi Price on Sep 11, 2014 11:45:00 AM

Many industries are beginning to feel the strain associated with enterprise mobility security, and for good reason, as so many data breaches that have taken place in the past few years have been directly caused by poor BYOD management. Health care is likely the most notable in terms of threat management derived from mobile activities, while banking industry firms have been similarly challenged by an increase in targeted attacks of late. 

Read More

Topics: IT Security

Playing the IT governance card

Posted by Mike Vizard on Sep 3, 2014 8:00:00 AM

More than a fair number of IT organizations are now concerned about the lack of control they have over their IT after an extended period of irrational exuberance involving the adoption of “shadow IT services.”

While none of these organization want to sacrifice the flexibility that many external services running in the cloud provide, they clearly are open to alternatives that provide a modicum of control in a way that doesn’t compromise the overall agility of the business.

With that goal in mind IT service organizations are starting to gain traction with application services in the cloud that provide all the cost and agility benefits of a shared infrastructure in the cloud in a way that provides the governance capabilities that IT organizations crave.

Read More

Topics: IT Security

Ebola virus used as bait in malware and phishing scams

Posted by Manny Veiga on Aug 19, 2014 10:43:23 AM

Cybercriminals are leveraging international media attention on the Ebola virus to launch phishing campaigns designed to trick users into downloading malware or surrendering personal information.

Symantec researchers this week identified at least four malware operations that sought to prey upon the public's interest in the Ebola virus epidemic in West Africa.

It's yet another example of how cybercriminals frequently latch onto popular topics in their social engineering schemes. Other recent examples include a Fourth of July malware that targeted travel websites and a virus disguised as a CryptoLocker fixer tool.

Read More

Topics: IT Security

Cost of managing security has more financial orgs choosing MSPs

Posted by Kristen Ciccolini on Jun 5, 2014 10:49:00 AM

More and more organizations are finding it difficult to keep up with the cost of data security as threats become more challenging to deal with, especially within the financial services industry. As a result, more of these businesses are turning to managed service providers.

According to Larry Tabb, founder and CEO of research firm TABB Group, half of financial institutions will outsource IT management to IT service providers by 2016, with Tabb citing “increased agility, flexibility and responsiveness, faster time-to-market for new products and tighter security” as benefits.

Read More

Topics: IT Security

CIO Lesson: Your system is never as secure as you think it is

Posted by Ron Miller on May 29, 2014 8:30:00 AM

Last week at the MIT Sloan CIO Summit in Cambridge, MA, participants on a panel on the role of the CIO were asked about a big failure during their career. Fidelity Enterprise CTO Stephen Neff told a story that provides a lesson for every IT pro.

You're never as secure as you think you are.

Read More

Topics: IT Security

A traitor in our midst: The insider threat to IT security

Posted by Manny Veiga on May 28, 2014 12:58:00 PM

Plenty of attention has been paid to the IT threats that emerge outside an organization - hackers, APTs, malware - but what tools exist to help IT pros manage the risks sitting right under their noses?

Read More

Topics: IT Security