
Embracing, Managing, and Securing the Highly-Mobilized Workforce
Every organization today is experiencing some degree of mobility in their workforce. From the simple access of email from a smartphone, to a fully supported BYOD program – organizations like yours are finding themselves needing to address mobility requires like never before. So, the question becomes, what’s the right way to create a highly productive mobile workforce while still maintaining organizational security? Well, in this mini- webcast, Duncan MacDonald from NaviSite

1-2-3 Security Approach for Windows Server 2003 EOS
I think it’s safe to say that the threats that existed when you first deployed Windows Server 2003 were minor in comparison to today, both in severity as well as in number. The move from Server 2000 to 2003 was little more than a simple upgrade and you probably gave little or no thought to changes in security. Fast forward to 2015 and the differences in the security landscape – both in the types of threats to the OS and the available response capabilities built into new opera

Office 365 - When the Hype and Reality of Email Security & Availability Collide
You have to admit it’s tantalizing to say the least – exchanging (bad pun intended) the headache of implementing, managing, supporting, and updating Exchange for the lure of the simplicity of Exchange online within Office 365. But, when you get there, does the reality match the hype? You each have legitimate concerns with issues around security and availability, as you would for any system, so the question "Just what should I expect and what’s available to compensate for any

SMBs Are At Higher Risk Of Cyber Crime
If you work for a small business, you probably believe you’re not a target for cyber crime, largely because you have little of value to be stolen. You’re not alone. Almost half (44%) of small business management don’t see cyber crime as a priority either. But with 42% of small businesses experiencing at least one attack in the past 12 months, that thinking needs to be turned around. Phishing, malware, zero-day attacks, application vulnerabilities, and good old-fashioned autom

Three Basic Steps to Avoid Hacker Attacks
In the wake of so many security breaches, each news report seems to always focus on two things and two things only: The number of people/credit cards/passwords etc affected and the cause of the breach. Take a database breach at Comixology – the “cause” was a hacked database. Not surprising, as the 2013 Verizon Data Breach Investigations Report cites 92% of breaches involve outsiders and 52% of those breaches involved hacking. Like most breaches, we’re never given more detail

Survey - 2014 State of IT Changes
Netwrix Corporation, the #1 provider of change and configuration auditing software, released results of a new survey which found that a surprising majority (57%) of IT professionals have made undocumented changes to their IT systems that no one else knows about; while as many as 40% of organizations don’t have formal IT change management controls in place. Frequent system changes without documentation or audit processes can cause system downtime and security breaches from int
Webinar - It's Only a Matter of Time: Surviving an IT Audit
If you haven’t been through one, IT audits are a painful experience. An auditor starts digging deeper and deeper into your IT security and processes, each question seemingly more impossible than the last. And, unfortunately, you’re probably going to have one soon – it could be part of a compliance initiative or because of a security breach, or just a suspect issue in IT. Whatever the compelling event, an IT audit is in your future. Watch the recorded webinar with industry exp

Article - Does Auditing Have a Role in Your Security Strategy?
From InfosecIsland.com This article (written by Techvangelismand attributed to Netwrix CEO, MichaelFimin) covers how auditing should be a part of every aspect of a security strategy. Read the entire article here. Let us help you with your PR content - contact us today! #articles #auditing #security #strategy #pr #techvangelisminaction

Article - Can Security and Compliance Coexist?
From CMSWire.com This article (written by Techvangelism and attributed to Netwrix CEO, Michael Fimin) discusses the challenge that exists between implementing security and meeting compliance objectives. It also details how to actually find coexistence between the two. Read the entire article here. Let us help you with your PR content - contact us today! #security #compliance #articles #pr #techvangelisminaction