Network security is critical for any organization, but in the health care space, with the personal and medical details of millions of individuals in the balance, the stakes are even higher. Out-of-date software, unimplemented patches, or even outdated passwords could be the vulnerability that exposes the sensitive information of an innocent and unsuspecting patient base. Two recent security breaches suffered by prominent U.S. health insurers highlight these vulnerabilities.
In February, Anthem Inc., the second-largest health insurer in the U.S, revealed that a previously-disclosed hacker attack compromised the health care records of as many as 80 million individuals. A few weeks later, Premera Blue Cross reported that the personal, bank, and health data of an estimated 11 million individuals was exposed when hackers penetrated its system in a similar assault.
These two high-profile security breaches have intensified the spotlight on data security, and raised several important questions for health care organizations (what HIPAA calls “connected entities”) and groups that provide supporting services to health care entities (called “business associates”). These groups should be asking the following questions: (more…)
Organizations sit on mountains of data, and losing that content because of faulty or inadequate backup solutions can be catastrophic. No matter the size of your business, data backup is often necessary to protecting your bottom line. But not all solutions or methods will achieve this objective – at least not easily.
Technology firms like Arcserve, CommVault, Symantec, and others are working to fix that. They manufacture purpose-built backup appliances (PBBAs) that solely conduct data backups and restorations. And as more organizations demand the retention and protection of data, PBBAs are adding processing power and storage capabilities, and continue to leverage the cloud for backup storage.
We recently participated in the beta testing of the Arcserve UDP 7000 Series appliance, one of the newest available. What we experienced reaffirmed our beliefs about the PBBA space – it has solutions for organizations of all sizes, no matter what field.
Here are four takeaways about PBBAs from our beta test, and why these solutions might be right for your organization. (more…)
Data breaches seem to make headlines every week. And as of late 2014, 43 percent of 567 U.S. executives surveyed said their companies experienced a data breach in the past year.
But what’s shocking is how unprepared U.S. companies are for these hacks: 80 percent of the executives said employee negligence was a root cause, and 27 percent of companies didn’t have a response plan in place.
Still, the threat of a hack has pushed network security to the top of the IT priorities list, and organizations are locking down servers and networks. But there are a number of less obvious targets that could still expose sensitive data. Printers are just one example of the ancillary devices that could leave your security strategy vulnerable. (more…)
Imagine you had one cell phone to make phone calls and another to send text messages. And what if you had to tote around a third device solely to send email, and then yet another tool to access your daily calendar?
It’s easy to realize the absurdity of that scenario, but many IT environments are divided in a similar way. Modern technology is built to avoid fragmentation, and just as a single phone consolidates a wide range of functions, it should be similarly easy to realize a more commonsense approach to the critical IT integration infrastructure in your organization.
Efficient communication means the reliable exchange of documents, files, and messages among customers, employees, suppliers, and contract workers, but it’s not always present. The constant movement of inventory, payroll, and invoice documents, and various other internal and external exchanges, drive business so having a slew of separate, disconnected processes should sound a very loud alarm.
Ask your nearest system admin if the design of his organization’s IT integration infrastructure is ideal; chances are the network is composed of disparate systems “glued together” with years of custom code. This dysfunction entangles IT, which has to invest time and energy in the maintenance, monitoring, and management of each singular piece of the network.
A pointed and efficient data environment should be a goal for every IT department. That’s where the consolidation of data integration can work wonders for a business. (more…)
The National Retail Federation’s Big Show was the biggest one yet, as 35,000 retail professionals flooded the Javits Center in New York City to see the newest retail technology and to stay up on industry trends. From digital signage to same-day delivery to mobile payments, the many breeds of technologies for bricks-and-mortar stores dominated conversation at the Big Show. But one key question remained unanswered: How do retailers accomplish it all?
Over the next eight months or so, retailers large and small will be planning, buying, and installing new technologies in anticipation of the 2015 holiday rush. But some organizations are better prepared than others to take the reins and lead the charge. Is your organization ready to start a major tech push, from planning and buying to rollout and support?
The health of your IT environment stems from your IT infrastructure, professionals, and policies. Ask yourself the following questions to check up on whether your IT department is fit enough to start implementing the newest retail technology. (more…)
After discussions with hundreds of IT and security professionals, one concern rises above the rest in the modern IT environment: visibility. How often have you heard or read the phrase “I don’t know what I don’t know?”
Even after years of deploying perimeter controls and endpoint protection, IT is still challenged with identifying and responding to unknown infrastructure threats in a timely manner. This can be attributed to a variety of issues, including changing threats, limited resources, and improperly deployed or configured security controls.
Having identified these challenges as top of mind for IT, how can organizations possibly start to regain security vision? Fear not: Every organization can take steps to repair its vision and gain insight into security and operational events. These steps can be as simple as updating supervisory controls and as complex as deploying next-generation firewalls (NGFWs).
As you look to fortify your IT security, consider these three critical steps: (more…)
Gone are the days when IT professionals had to rack, stack, connect, and configure every piece of data center infrastructure. Now, you can plug in a single box, thanks to converged infrastructure.
Converged infrastructure, hyperconverged infrastructure, and reference architectures are in essence the same thing. They all combine compute, network, and storage resources into one cohesive unit, but the main differentiator is the way they are procured and installed. Before you try to decide whether these options are right for your organization, and which to choose, it’s critical to understand the subtle but significant differences among the three types of converged infrastructure.
Generally speaking, there are three approaches companies can take to settle on a new data center installation: (more…)
No organization is immune to security risks. Between malware, viruses, network attacks, and data breaches, organizations must keep a watchful eye on the health of their IT environment.
But often the biggest security risk is the one you’re not paying attention to. It’s not forgetting to patch security vulnerabilities, or not running antivirus, or relying on outdated software. Those are bad ideas, for sure, but there is one idea that’s worse than all of those combined: Not conducting regular data backups.
Organizations that don’t follow through with regular data backups aren’t alone, and a proper system backup solution doesn’t have to be a budget-busting endeavor. IT can easily fill this security gap with the right support. (more…)
If you’ve been in this business long enough, you know the Solid State Drive (SSD) has been around since the late 70s/early 80s. Fast and unbelievably reliable compared to spinning disk drives, SSDs for many years were a favorite only at financial institutions, investment houses, and stock markets – some of the few companies that could afford them and needed the speed and reliability of a non-stop system.
Today, organizations of all shapes and sizes can benefit from the ultra-high speeds and friendly price tag of SSDs. But it’s crucial to understand the uses of flash storage in a data center environment and how it relates to your organization’s business needs. That way you can make the right decisions about solid state drives and related storage units. (more…)
Thanks to holiday shopping, retailers pull in 70 to 80 percent of their year’s revenue in the last three months of the year. While reports show sales were slightly down in bricks-and-mortar stores to start the holiday season, these stores still have a leg up on online retailers.
But there’s no question that online shopping is a thorn in the side of retail stores. With free shipping more common than ever before and daily (sometimes hourly) deals to entice buyers, online retailers are racing to close the gap with bricks-and-mortar stores to keep customers coming back. But physical stores are fighting back: Digital displays with dynamic price adjustments offer better in-store pricing, beacon technology and apps enhance the customer experience, and mobile payment options attempt to make shopping easier and more seamless.
These options will inevitably be the talk of this year’s National Retail Federation (NRF) Big Show, being held from Jan. 11 to 13 in New York City. But it’s not just about technology — it’s about how that technology can provide a better customer experience. Retailers will try to crack the code on what the store of the future should look like, and consider the industry’s biggest mystery: How do we do it first? (more…)