Helping clients manage their technology for over 30 years.

Security holes that’ll keep you up at night: Advanced persistent threats

Impact of Advanced Persistent Threats on IT Security

Malware comes in many flavors. I’m focusing now on one of the most pernicious, advanced persistent threats (APTs), because these frequently use the techniques of zero-day attacks  to remotely manipulate a system while remaining virtually invisible to standard defenses.

Continue reading

Security holes that’ll keep you up at night: Managing the use of social media

Managing the use of Social Media

The ever-richer user information on social media presents an irresistible opportunity for ‘fraudsters.’ Because it’s so easy to research a target online, attackers have developed very effective masquerading and social engineering tactics that can fool even the most sophisticated users.

Continue reading

Security holes that’ll keep you up at night: Doing some data breach math

Data Breach Threats Faced By Business IT Infrastructure

Over the last few weeks, I’ve taken a look at what you can do to boost your organization’s IT security. But it occurs to me that maybe I’ve put the cart before the horse.

So I’m going to spend the next few weeks delving into the sort of threats your business’s IT infrastructure faces. And I’m going to start with data breaches and the most recent big-headline example: Zappos (parent company is Amazon.com), which last month admitted it suffered a data breach that compromised 24 million customer accounts.

Continue reading

Automating network performance: 6 key capabilities

Capabilities to look out for in a Network Performance Monitoring Provider

The right network management capabilities will provide the feedback you need to eliminate bottlenecks and IT failures while also enabling your network’s ability to deliver data, voice, wireless, Internet, and video services.

Which is why adequate performance management, trending and capacity planning, protocol analysis/fault isolation, and onsite/remote network health monitoring have become so essential.

Continue reading

Is server virtualization messing up your network’s performance?

Impact of Server Virtualization on Network Performance

Thanks to virtualization, network dynamics are changing — fast.

Server virtualization consolidates resources on fewer physical servers in ways that require distributed workloads to communicate with each other. This boosts utilization of servers, but it also increases — and changes the nature of — network traffic.

Continue reading

Curing Those Security Blues

Are you suffering from security fatigue? Find yourself getting irritated when your IT folks bring up yet another security issue? You’re not alone. Lately I’ve been witnessing a good deal of security fatigue in the executive suite, and I’m not surprised.

Truth is, security remains a never-ending process. The easier we make it to move data, the more vulnerable it is to loss or theft. In fact, our Page 1 story this issue on Data Loss Prevention is all about how easy it is for too many employees to make off with sensitive, proprietary information.

Continue reading

Isolating and resolving network problems

How to resolve Network Problems.

When it comes to keeping your IT network performing optimally, finding and fixing network faults certainly is crucial. But it’s just as crucial to sustain network operations while the issue gets resolved.

Which means that the first order of business is to ensure that your network has entered one of the failure modes you’ve designed for it so that remaining network resources are allocated according to your organization’s business priorities.

Continue reading