Month: July 2014

CDW put together the infographic below to summarize the state of affairs in banking industry cybersecurity.Summary: things are not as good as one would hope yet not as bad as one could fear.Summary by Fred Donovan in FierceCIO.Emphasis in red added by me.Brian Wood, VP Marketing—– Infographic: Banking customers blissfully unaware of rise in cyberattacks […]

  • Posted in Blogs
  • Comments Off on Infographic: CyberSecurity in the Banking Industry
  • Tags:

Not enough stress and people get bored; they feel as if they are not challenged or growing.Too much stress and people burn out; they feel as if they have no control over their lives.The objective of any manager is to find that happy medium — for your people as well as for yourself.Summary article by Emily […]

  • Posted in Blogs
  • Comments Off on We Cannot Stress This Too Much: Our IT Personnel
  • Tags:

Summary: Don’t believe the hype. Keep calm and carry on. Don’t overreact.Article by Peter W. Singer and Allan Friedman in Wired.Emphasis in red added by me.Brian Wood, VP Marketing—– The 5 Biggest Cybersecurity Myths, Debunked “A domain for the nerds.” That is how the Internet used to be viewed back in the early 1990s, until […]

  • Posted in Blogs
  • Comments Off on Cybersecurity Myths: Debunked
  • Tags:

Executives like golf, right? And execs have valuable information?And hackers target people with valuable information, yes? QEDI’ve always wanted to have a blog post with the title above. Mission accomplished.Article below by Ian Urbina in The New York Times.Emphasis in red added by me.Brian Wood, VP Marketing—— Hacker Tactic: Holding Data Hostage Hackers Find New […]

  • Posted in Blogs
  • Comments Off on Beware the Emailed (Hacker) Golf Invitation
  • Tags:

What do you do when you have two business important functions that are each being transformed by the extremely rapid pace of technology advancement?Why, you mash them into one group and crown their leader as king or queen of both! Right?What would Cersei Lannister Baratheon do?Summary article by Emily Poe in FierceCIO. original piece by […]

  • Posted in Blogs
  • Comments Off on Got CMTO? Chief Marketing Technology Officer
  • Tags:

There’s been much discussion about “the rise of the Chief Marketing Officer” when it comes to IT spending.The articles below tend to downplay any sense of tension or power-play and instead focus on how successful leaders are forging ahead.Can’t we all just get along? Yes!Summary articles by David Weldon in FierceCIO; original by Nadia Cameron […]

  • Posted in Blogs
  • Comments Off on CIO-CMO Relationship: New BFFs?
  • Tags:

Most interesting result — and this is extremely important to our collective understanding of cloud adoption:”While the benefits of the cloud increase with experience, the challenges of cloud show a sharp decrease as organizations gain expertise with cloud. Security remains the most-often cited challenge among Cloud Beginners (31 percent) but decreases to the fifth most […]

  • Posted in Blogs
  • Comments Off on RightScale 2014 Cloud Computing Survey
  • Tags:

When we were little we were taught to look both ways before crossing the street.That type of habit pattern helps keep us from being hit by a car, a bus, a bicycle, or even a jogger.Similarly, a good habit for us to develop regarding web usage is to view / confirm the URL before viewing […]

  • Posted in Blogs
  • Comments Off on Look Both Ways Before Clicking the Link
  • Tags:

The good news is that the storage portion of IT budgets is increasing.Its “share” within IT budgets went from 9.5% in the prior study to 13.5% now.The bad news is that the number of actual dollars being allocated is declining.Article by Nikolay Yamakawa in 451 Research.Emphasis in red added by me.Brian Wood, VP Marketing—— Overall […]

  • Posted in Blogs
  • Comments Off on Storage Portion of IT Budgets Is Increasing
  • Tags:

My three favorite snippets from the article below: “With the Internet of Things every company becomes a technology company, and every company becomes a security company.” “When you acquire a company, you inherit all of that company’s cybersins.” “There’s no one forcing companies to patch vulnerabilities to protect their users” Article by Kashmir Hill in […]

  • Posted in Blogs
  • Comments Off on 10 Expert Opinions on Cybersecurity
  • Tags:

Retention of top talent is one of the top concerns for IT leaders globally — but on balance, things haven’t been this good in quite a while.And words like “cloud” and “big data” don’t even appear in these articles.Watershed indeed.Summary article by David Weldon in FierceCIO based on a piece by Dennis McCafferty in CIO […]

  • Posted in Blogs
  • Comments Off on Harvey Nash Survey: CIOs Happy, IT Budgets Rising
  • Tags:

$375B to $575B is the range estimated by a recent study for the impact of cybercrime globally.That’s a lot of Big Macs but what’s even more interesting is that most cybercrime may actually go unreported.The U.S. is number 1. Hooray?Summary article by David Weldon in FierceCIO, original piece by Jeremy Kirk in Computerworld.Emphasis in red […]

  • Posted in Blogs
  • Comments Off on McAfee Study: Reported Cybercrime $400B Annually
  • Tags:

Like watching a movie about gangsters or members of a drug cartel, its eerily fascinating to peer into the lives and behaviors of the bad guys.Such is the gist of the article below regarding the strength (or not) of a bunch of hacker passwords.Summary article by Paul Mah in FierceCIO; original post by Antonín Hýža […]

  • Posted in Blogs
  • Comments Off on Hacker Passwords: Stronger than Yours? Uh, No
  • Tags:

Be afraid. Very afraid.And only open emails that don’t contain malware.And if that doesn’t work for you, then consider cyber security assistance from AIS.Article by Matt Egan in Fox Business.Emphasis in red added by me.Brian Wood, VP Marketing——- Cyber Shakedown: Hackers Unleash Mafia-Style Extortion Tactics Scott Heiferman received a disturbing email one recent Thursday morning […]

  • Posted in Blogs
  • Comments Off on Extortion Offers You Can't Refuse?
  • Tags:

The Boy Who Cried Wolf is one of Aesop’s Fables.According to an inside source at Wikipedia, “The tale concerns a shepherd boy who repeatedly tricks nearby villagers into thinking a wolf is attacking his flock. When one actually does appear and the boy again calls for help, the villagers do not come thinking that it […]

  • Posted in Blogs
  • Comments Off on Are You Protecting Your Privacy? Didn't Think So.
  • Tags:

  In 2011 the San Diego region (along with parts of Orange County, Arizona, and Baja) suffered a major power outage that lasted 12 hours and impacted millions of businesses.For many, SDG&E’s outage was a wake-up call for disaster recovery (DR) and business continuity (BC) preparedness.When evaluating your options for DR/BC services, here are a […]

The article below highlights how a distributed denial of service (DDoS) attack can be used as a ruse to direct attention “over here” while the bad guys get to work “over there”.It also points out the value of outsourcing certain portions of IT security to an external provider — one who likely has significantly more […]

  • Posted in Blogs
  • Comments Off on When Is DDoS a Ruse?
  • Tags:

The strategy used to be all about building thick, tall walls and stocking the moat with alligators: the perimeter defense.Nowadays, IT security staff are better off assuming that the bad guys (and the good guys — employees — sometimes doing bad or stupid things) have already breached the perimeter and are on the inside. Now […]

  • Posted in Blogs
  • Comments Off on Perimeter Defense: Still Secure?
  • Tags:

Now you know.Article by Rona Borre in FierceCIO.Emphasis in red added by me.Brian Wood, VP Marketing—— IT’s hottest jobs: Software developer Job title:Software developerKey responsibilities for this individual:Software engineers work on the design, development, maintenance and evaluation of computer software and systems. Depending on the company and industry they’re developing for, software developers’ duties can […]

  • Posted in Blogs
  • Comments Off on In the Spotlight: Software Developer
  • Tags:

One danger of specialization is silo-ization and gaps.”Sorry, that’s not my area of responsibility; I do X. Hopefully Bob in IT has it covered.”Yeah, let’s hope.Or better yet, let’s have a single-subject meeting with all the relevant players to outline explicitly who is responsible for what.Article posted on Help Net Security.Emphasis in red added by […]