The biggest security mistake you can make (and how to avoid it)

biggest security mistakeNo organization is immune to security risks. Between malware, viruses, network attacks, and data breaches, organizations must keep a watchful eye on the health of their IT environment.

But often the biggest security risk is the one you’re not paying attention to. It’s not forgetting to patch security vulnerabilities, or not running antivirus, or relying on outdated software. Those are bad ideas, for sure, but there is one idea that’s worse than all of those combined: Not conducting regular data backups.

Organizations that don’t follow through with regular data backups aren’t alone, and a proper system backup solution doesn’t have to be a budget-busting endeavor. IT can easily fill this security gap with the right support. Continue Reading…

Tags: , , , , , ,

Top 5 IT priorities in 2015

Strategy conceptGone are the days when the IT department could enjoy a healthy remove from overall business operations. Instead, today’s IT leaders are front and center — in boardrooms, sales calls, and customer meetings across the globe. This new role and visibility demands that CTOs and CIOs constantly shift and adjust their strategies, priorities, and tactics to effectively capitalize on emerging technological and business trends.

It’s a tough task, made all the tougher by the lightning-quick pace of technological change. Following is my take on the top five priorities for IT leaders to focus on in 2015: Continue Reading…

Tags: , , ,

Avoid unnecessary pain by properly planning your move to O365

planningMicrosoft’s Office 365 (O365) continues to draw more organizations to the benefits of the cloud. O365 is Microsoft’s fastest-growing commercial product ever, and the cloud software suite was a key driver in the 147 percent jump year over year in Microsoft’s commercial cloud business revenue during its fiscal fourth quarter of 2014.

But while millions of licenses have been sold, not all have been deployed. Some organizations might be slow to take advantage of the O365 licenses they purchased, whether because it’s their first attempt at a cloud implementation, because IT is mired in maintaining the current infrastructure, or as is often the case, because they didn’t invest enough time in planning.

Planning how to deploy and secure O365 is a frequently overlooked topic. Here’s where to start: Take stock of your current IT expertise and resources, and identify any limitations that might hinder rollout of your new investment. There are a number of options available to help make the move to the cloud, so knowing where your organization stands early on will help you choose the one that gets you up and running on O365 faster.

Here are three questions to ask yourself to determine the best approach for your move to O365. Continue Reading…

Tags: , , ,

3 questions to help you find the best enterprise content collaboration solution

Cloud-On-Multiple-DevicesThe storage wars have been a popular topic of late. Whether it’s Microsoft and Google competing with Amazon Web Services’ ever-plummeting prices, or how economies of scale affect a player like Box, these stories often focus myopically on the storage component of the vendors and ignore the more important story: what the different offerings actually enable users and businesses to do with the content once it’s stored in a given system.

Every organization has its own needs and requirements when it comes to content. And businesses are increasingly taking a best-of-breed approach to their IT ecosystem; gone are the days when companies would buy all of their software, hardware, and services from a single vendor. With the rise in adoption of Office 365, Microsoft’s cloud-based productivity suite, many organizations are looking for complementary content solutions to expand their administrative controls and reporting of content, cross-platform usability, secure external collaboration, and BYOD mobile access.

How do you decide the right approach for your organization? Here are three questions to consider: Continue Reading…

Tags: , , ,

The top 5 features all companies should look for in a mobile security solution

Cloud security has been a top concern ever since organizations first began to shift data into the cloud and away from on-premises solutions.

While many cloud providers offer robust enterprise capabilities, including encrypted content, passcodes, and mobile device management, many can still fall victim to a serious security risk: data leakage.

Blake Brannon Airwatch

Blake Brannon is a senior solutions engineer at AirWatch by VMware.

In an age where organizations and employees muddle the boundary between personal and private devices, employees can often access or transfer data to their unmanaged and unprotected devices. Providing employees with the ability to transfer and share sensitive data significantly increases the risk of data leakage.

The cloud leakage problem is one of the greatest threats to enterprise content security. While many cloud solutions secure enterprise content within the cloud infrastructure, they often lack the controls necessary to keep mobile users from downloading and walking away with critical information on personal, unsecured devices. However, there are powerful mobile security solutions that provide extra security for content in and out of the cloud. Here are the top five features companies must look for when choosing a mobile security solution that ensures content is secure.

Email protection — One of the easiest ways for employees to compromise content is by emailing secured cloud data to themselves on unprotected, personal email accounts. This not only leaks corporate content outside of an organization, but places it at greater risk of external hacks. Find a mobile security solution that can rein in rogue emailing and button up this source of content leakage by allowing only managed devices to synchronize with and download content from the cloud. These solutions also enable IT teams to monitor downloaded content, further securing your data.

Download prevention — The advent of the cloud means IT can no longer contain sensitive content behind four walls, and managing what devices can access company data has its limits with some cloud solutions. The easiest way to prevent employees from downloading sensitive data to personal devices is by forbidding external downloads onto unsecured devices altogether. But with some services, users can access content with phones that aren’t managed, creating a major backdoor into your data. Fixing this problem will take some integration between the technology and the particular ecosystem, but this issue will likely be addressed sooner rather than later. For now, find a solution that can limit what devices have access to content in the cloud. Continue Reading…

Tags: , , , , ,