Month: April 2014

For ages, the only way to store important information was to write it down and put it somewhere safe or keep it locked away in the vast and mysterious landscape of the brain.The, the Gilded Age of the late 19th century brought new fervor to invent contraptions to solve everyday problems. Soon enough the Information […]

  • Posted in Blogs
  • Comments Off on AIS Infographic: Information Storage
  • Tags:

The article below was published by Moss Adams. Protecting Yourself and Your Organization from Heartbleed by Francis Tam, Partner, and Kevin Villanueva, Senior Manager, IT Auditing & Consulting Practice The Heartbleed bug is a vulnerability found in the OpenSSL cryptographic software library that could allow the theft of normally encrypted information, such as user names […]

Dear customers, partners, vendors, and prospects:In response to the recently announced Heartbleed SSL bug, AIS (American Internet Services) has thoroughly reviewed all of its publicly-accessible applications, devices, and services including the AIS client portal, known affectionately as T.A.S. (The Automated System).None of these systems were ever vulnerable to the Heartbleed exploit and there is no indication […]

  • Posted in Blogs
  • Comments Off on AIS Heartbleed Attestation
  • Tags:

Let’s not throw out the baby with the bathwater, m’kay?Article by David Hamilton in The WHIR.Emphasis in red added by me.Brian Wood, VP Marketing—— To Build Trust Online, SSL Certificates Are Still the Starting Point Trusted online communication is a truly vital aspect of the internet. From a technical perspective, we tend to rely on […]

  • Posted in Blogs
  • Comments Off on Website SSL Certificates: Baby in Bathwater
  • Tags:

Maliciousness is inexcusable and should be prosecuted.Ignorance is leadership’s responsibility and should be rectified.Either may, constant and sophisticated monitoring is necessary in order to know what is going on.Article by Chris Burt in The WHIR.Emphasis in red added by me.Brian Wood, VP Marketing—– Insider Data Theft Among Top Cybersecurity Threats for US Federal Agencies: Study […]

  • Posted in Blogs
  • Comments Off on Insider Threats: The Enemy Within
  • Tags:

Teach the children and let them lead the way.Teach the employees and save yourself a lot of headaches.Article by Violet Blue for Zero Day and republished in ZDNet.Emphasis in red added by me.Brian Wood, VP Marketing—— How hackers use employees to break through security walls Summary: Employees are prime targets for cybercrime attacks against your […]

  • Posted in Blogs
  • Comments Off on Employees Are the Weakest Link
  • Tags:

Tuesday, April 22, 2014 | Hyatt Regency La Jolla 3777 La Jolla Village Drive San Diego, CA 92122 8:00 AM to 5:00 PM [button link=”http://www.vmug.com/p/cm/ld/fid=4647″ style=”blue” window=”true” size=”small”]More Info[/button] [button link=”http://www.vmug.com/p/cm/ld/fid=4653″ style=”red” window=”true” size=”small”]Registration[/button] 2014 User Conferences VMUG has over 35 conferences planned throughout the year worldwide in many locations. Most of these conferences are complimentary full-day events, with multiple […]

It’s no surprise, really, that the IT world is moving exponentially faster by the day. At the rate things are going, it’s nearly impossible for IT administrators to stay on top of technology changes while also doing their day jobs of running networks, coaching users, protecting data, and prepping for tomorrow’s expanding to-do list. Admins […]

  • Posted in Blogs
  • Comments Off on Is Technology Outpacing Your Talent?
  • Tags:

The article below by John Bryan in Naked Security is the yin to tomorrow’s yang on the same topic — so be sure to check back mañana.The essence of the debate is whether we are gearing up to fight the last war rather than recognizing that the threats (and what we value) have changed over […]

  • Posted in Blogs
  • Comments Off on Is Data Privacy an "Old Fashioned" Concept?
  • Tags:

Underground economics, reputation, and the code of honor.Sometimes truth is just as exciting as fiction!Interesting stuff.Article by Violet Blue for Zero Day and reprinted in ZDNet.Emphasis in red added by me.Brian Wood, VP Marketing——- Hackonomics: ‘Cyber Black Market’ more profitable than illegal drug trade Summary: OPINION: A new report by RAND commissioned by Juniper Networks […]

  • Posted in Blogs
  • Comments Off on Cyber Black Market More Profitable than Illegal Drugs
  • Tags:

Oy vey. Collectively, the survey respondents below get a resounding “D” when it comes to disaster recovery.And that’s nothing to brag about. Collectively we can, and should, do better.Change starts at home — so make it so.Summary article by Steve Ragan in CSO.Emphasis in red added by me.Brian Wood, VP Marketing—– When it comes to […]

Just because you have it — or have access to it — doesn’t mean that you should use it.(Especially if “it” is personal data from the good citizens of Europe, as European privacy laws are different (and stricter) than those in the United States.)Blog post by David Snead in The WHIR.Emphasis in red added by […]

  • Posted in Blogs
  • Comments Off on Big Data: A Lawyer's Perspective
  • Tags:

SAN DIEGO (April 15, 2014) – AIS (American Internet Services), the Southwest’s leading provider of tailored data center and cloud service solutions, today announced that it is now a member of the VMware Service Provider Program (VSPP) as an Enterprise level member. AIS has been providing VMware-based cloud services in the Southwest region since June […]

Big data: it’s not just more of the same.This time it’s different. Really different.Article by Harvey Koeppel in Search CIO.Emphasis in red added by me.Brian Wood, VP Marketing—— Big data is not little data writ large — it changes everything The origins of confusion …The real challenge with big data is that it is called […]

  • Posted in Blogs
  • Comments Off on Big Data Tomfoolery
  • Tags:

It takes a special person to be an IT Admin, it really does. These guys (and sometimes girls) are sorely needed within a company and they have a style that’s uniquely all their own.So, what are some dead giveaways for identifying these techie geniuses? If a majority of the following criteria is met, you may […]

  • Posted in Blogs
  • Comments Off on 9 Tell-Tale Signs of an IT Administrator
  • Tags:

Wash your hands, brush your teeth, take your vitamins, and secure your network.Article by Eric Geier in Network World.Emphasis in red added by me.Brian Wood, VP Marketing—— 8 ways to improve wired network security We sometimes focus more on the wireless side of the network when it comes to security because Wi-Fi has no physical […]

  • Posted in Blogs
  • Comments Off on Motherhood: Wired Network Security
  • Tags:

The Internet of Things: this changes everything. We’ll need more storage. More bandwidth. More security. More processing power. This changes nothing. Summary article by Fred Donovan in FierceMobileIT. Emphasis in red added by me. Brian Wood, VP Marketing ——- Internet of Things threatens to overwhelm data centers, open security holes The Internet of Things will […]

  • Posted in Blogs
  • Comments Off on IoT Will Cause the Sky to Fall
  • Tags:

Global customer care and billing solution provider to consolidate U.S. data center operations with AIS for improved efficiency, performance, and flexibility SAN DIEGO (April 8, 2014) – AIS (American Internet Services), the Southwest’s leading provider of tailored data center and cloud service solutions, today announced that Hansen Technologies, a global customer care and billing solution […]

This is the 14th year in a row in which Identity Theft is consumers’ number one concern reported to the Federal Trade Commission.Be careful about what you click!Summary article by David Weldon in FierceCIO, original article by Michael Cooney in Network World.Emphasis in red added by me.Brian Wood, VP Marketing——– Identity theft still top consumer […]

  • Posted in Blogs
  • Comments Off on Identity Theft Is Consumers' Top Complaint
  • Tags: ,

To be clear, we are not in the mobile (or even wireless) healthcare market, but the IT security trends exemplified within it cross boundaries into related trends of other market segments.I hope you find the infographic interesting and useful.Summary post by Fred Donovan in FierceMobileIT.Emphasis in red added by me.Brian Wood, VP Marketing——- Infographic: Mobile […]