If the news is any indication, IT security (or the lack thereof) is a growing concern among companies of all sizes. In the wake of reports that Chinese hackers are engaging in commercial cyber-espionage, some companies are calling for a go-ahead to hack right back when they fall victim to such security threats. Breaches by hackers from Syria, Iran, and other countries around the world signal the need for a new approach to guarding IT infrastructure.
But even beyond hackers, there are a number of threats to corporate IT systems that can disrupt business and gouge bottom lines. Let’s look at some of the major threats and how companies of all sizes can mount a defense to keep their systems secure.
Top four IT security threats
From outsiders to your own employees, here are definitions for four of the most common vulnerabilities in corporate networks:
- Hackers. One of the oldest and most commonly understood threats, hackers work as individuals or groups to leverage weaknesses in an organization’s IT infrastructure to gain access to its systems. Through the years this access has dramatically evolved from young pranksters seeking little more than bragging rights to today’s organized groups of cyber criminals stealing financial and proprietary information for financial or political gain. Today’s hackers use both manual and automated processes to break into an organization’s IT infrastructure.
- Malware. Malware refers to any type of malicious software used to infiltrate private computers or networks in order to gain access to sensitive data. Malware is also used to slow down system performance by utilizing memory, CPU, and other system resources. Wikipedia offers a comprehensive list of the different types of malware, including computer viruses, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious browser plug-ins, and rogue security software. Continue Reading…
At Cloud Expo this week, SHI had the opportunity to participate in a number of presentations and panel discussions about the state of the cloud services industry. We offered insights that have come not only from our experiences delivering these services, but through a series of CIO roundtable events we have been hosting over the past four months.
Using some of the best practices and case studies gleaned in these sessions, our CTO, Rich Taggart, kicked off the Expo for us on Monday with a breakout session highlighting how cloud services are changing IT delivery and, as a result, the role of IT departments. One of the attendees of the presentation, Michael Steinhart of The Enterprise Cloud Site, summarized the key takeaways in his article “CIOs Evolving With Cloud Services.”
Check out what he had to say:
When it comes to software licensing compliance, manufacturers are stepping up their game. All the major software vendors are ramping up their audit frequency. Gartner and other industry pundits have noted this acceleration for the last few years, and there doesn’t appear to be any slackening of the pace. Just as notable, software vendors are also increasing the intensity of their audits, digging deeper and harder into some of the areas in which they’ve traditionally given customers some leeway.
Most of the penalties a customer can suffer from a manufacturer audit are not immediately apparent or quantifiable. Nonetheless, there are very real costs for poor software license governance and manufacturer audits. They include: Continue Reading…
With the 12th International Cloud Expo only a few days away, the SHI Cloud team has been hard at work preparing their presentations and making sure our booth is ready to accept visitors. But that doesn’t mean we haven’t been able to have a little fun too. This week we launched a series of animated Vine videos to get customers, partners, and other attendees pumped about the show and eager to learn more about the new SHI Backup as a Service offering that we’ll be showcasing at our booth.
If you’re following us on Twitter, you might have seen them. But if you haven’t, here are the six videos we’ve published so far. If you have 36 seconds, you have enough time to watch them all. But good luck watching each one only once!
When you’re done watching, scroll down to let us know which is your favorite.
How many devices do you need in a typical workday to do your job well? If a Forrester study from last year is any indication, 74 percent of you use two or more devices, and 53 percent use three or more.
While each of those devices plays a particular role, switching among a PC, tablet, and smartphone throughout the day can be inefficient, both for users carting around multiple devices and IT help desks juggling myriad operating systems, licenses, and security concerns.
This is the thinking that led to the Lenovo Helix, a hybrid Ultrabook and tablet. One of a new crossbreed of mobile devices, the Helix is designed to simplify mobility for workers who spend a lot of time away from their desk but still need significant computing power and a full keyboard and mouse. It works just like a regular Ultrabook, but users can detach the screen, which functions as a tablet.
Here are four ways the Helix is simplifying workers’ mobile lives: Continue Reading…
Virtually every week you read in the news about some large, well-known company suffering from the loss of sensitive corporate information at the hands of their employees. A Symantec study found that people who find a lost smartphone tried to access its private information — including trying to access a banking app — 89 percent of the time. And with so many users connecting their smartphones to their work email or company apps, the chances of sensitive corporate data falling into the wrong hands is more real than ever.
This is where being covered by a Mobile Device Management (MDM) solution is key.
What is MDM?
MDM is a software solution that monitors, secures, manages, and supports all mobile devices on its network and can reduce IT support costs and business risk. It can reside in the cloud or a private data center. Hosting an MDM on-premise will incur higher capital costs, obviously, requiring an organization to purchase hardware up front and maintain regular software maintenance. However, some businesses find an on-premise solution is necessary for security or compliance reasons. Continue Reading…
VMware introduced its vCloud Hybrid Service yesterday, an Infrastructure-as-a-Service offering that connects and integrates both onsite and offsite IT environments and enables IT to extend their data centers to the cloud. What you might not know is that SHI is one of the first partners to begin offering vCloud Hybrid Service.
One of the greatest benefits that we see is that vCloud Hybrid Service doesn’t force IT departments to reinvent the wheel. The in-house applications and infrastructure in which they have already invested don’t require reconfiguring, and there isn’t any hardware required. It’s a seamless transition.
Of course, there are considerations that will need to be made and we’ll share those with you in the coming weeks as we begin to migrate customers to this hybrid cloud service. If you want to be one of the first, email me at Ed_McNamara@SHI.com.