data security

06.21.16

Let’s Go All The Way

by

There is a certain frustration when you map out some wonderful plan only to see it get stalled somewhere close to the finish line. Doesn’t matter what it is – that epic blog post, the 427 Cobra project in the garage or even wrapping up that virtualization certification – whatever. One thing we have seen […]

Read More

05.04.15

Addressing IT’s Biggest Security Concerns

by

Security has become the biggest worry the IT world faces. With a growing number of high-profile breaches and no end in sight, we thought it wise to examine the security issues that concern IT professionals most, ensuring our products are still addressing the security and compliance needs of businesses using virtual systems.

Read More

04.10.15

FDA Guidelines for Medical Device Security Offer Wise Approach to PHI Security

by

New voluntary guidance from the FDA tells medical device managers to address security before submitting devices for pre-market review. This approach underscores the importance of security integration in product design (not just for the device, but for the firmware and systems that host the data) rather than the add-on approach that has failed so many […]

Read More

04.08.15

Leverage Smart HR Tactics to Prevent Insider Data Theft

by

Businesses tend to focus on IT security when it comes to protecting their data, but your Human Resources department has an important role to play, as well. HR departments have been battling this menace since well before the age of computers. By leveraging the lessons learned by employers in managing employee dishonesty and focusing on […]

Read More

04.01.15

Local Software vs. Automated Virtual Appliances: IT Security and Threat Management in 2015

by

If there’s one good thing to come out of 2014’s rash of security breaches, it’s increased awareness and more serious treatment of security in budgets. Greater financial resources bring important IT improvements, but also enhanced accountability for threats. As a result, more foresight than ever is required. The best way to prepare for the future […]

Read More

03.20.15

When Consumer Privacy Is a Competitive Advantage, Security Can Be a Marketing Tool

by

New research from Forrester predicts that strong privacy policies will give businesses a competitive edge in 2015. We think Forrester has a good point. Research shows that privacy is a major concern for consumers, so companies with strong security will be able to leverage their strength and enjoy the marketing benefits. When faced with the […]

Read More

03.18.15

How to Spot a Rogue Systems Admin and Protect Your Data

by

Your admins are vital to both the functioning of your systems and the security of your entire organization. Most of them are honest, ethical, hard workers who do a sometimes thankless job without complaint. But even one rogue admin can cripple your company by locking down your systems, running off with your data, or worse. […]

Read More