As an IT veteran, I have observed and helped drive tremendous change, not just in the technologies we use but how we use them. Among the more dramatic shifts has been the definition of being a mobile worker. When I was a mainframe programmer in the late 80’s, being “highly mobile” meant I could log in at any mainframe terminal in the office, do my programming, submit my jobs to the queue and do my (internal only) email.
For years, analysts have been reporting on the risks of unattended employee workstations. For example, a user who sits down at a co-worker’s PC could access sensitive data, send email from the PC owner’s account or even introduce malware into the network. To make matters worse, such misuse of an unattended workstation is difficult to detect and prove.
It is clear that today’s businesses require reliable network connectivity, and access to both corporate and Internet resources. Connections to and from business units, external customers and SOHOs are all equally important to ensure continuity. Business runs all day, every day, even in off hours. Most companies run operations around the clock, so it is important to realize that solid business continuity strategy and redundancy technology should be considered and implemented.
Hackers and security researchers converged in Las Vegas this week to reveal the latest and greatest threats facing security professionals today. In presentations at the Black Hat 2015 conference, demonstrations showed how the rise of the Internet of Things, connected devices, new mobile technologies and other developments have opened up the door to more threats than ever before.
PTS Physical Security Solutions offers a turnkey solution to address all your physical security needs. Utilizing cutting edge technologies offered by our partners, PTS offers the following solutions: Video Surveillance, Access Control, and Central Management. PTS’s primary Physical Security platform is Genetec’s Security Center (Unified Platform), which has applications for Video Surveillance, Door Access control, License Plate Recognition, Alarm Panel Integration and other third party capabilities. These applications are all viewable on one simple Customer Interface.
In light of a number of recent breaches spanning healthcare, retail, and even government, I thought it would be nice to take a second and focus on storage and security. Here’s the reality: with so many new types of applications being developed (both internally and in the cloud), new concepts around security are emerging which directly impact storage technologies.
Supporting an expanding mobility program or bring-your-own-device (BYOD) initiative can quickly become a complex undertaking for your IT group. As administrators try to stay afloat, managing and supporting a diverse array of device types, operating systems, applications, user policies and more, security can be put at risk.
If you allow employees to use their personal devices for work, are you exposing your organization to new security risks? Attempted security breaches are on the rise, and employee smartphones, tablets and laptops could provide new pathways for malware, viruses and hacking. What can you do to protect enterprise information, applications and networks while still supporting your organization’s bring-your-own-device (BYOD) program?
At a recent security meeting with a large healthcare organization, I had the privilege of looking at the logs of a private cloud infrastructure which I helped design. They showed me a couple of interesting numbers and what looked like possible DDoS attacks. Except, they were different. The security admin mentioned that he, and colleagues in different organizations, have been seeing a spike in malicious DDoS attacks against their systems.