7 Ways Security Acts as a Business Enabler

Security is more than just an insurance policy against data breaches—business leaders also need to consider the benefits. When people hear the word “security,” they most likely think about breaches, firewalls or governance policies that strictly allow or deny access to business information. But security tools also provide deep visibility into a company’s IT infrastructure and a better understanding of how corporate compute resources are used.

Read more

High-Speed, Encrypted Flash Storage for the Cloud

Logicalis has added high-speed, encrypted storage as an option throughout our entire suite of cloud offerings. The addition of solid state disks (also known as flash storage) to our enterprise cloud, dedicated cloud and on-demand public cloud solutions gives our customers the ability to move, store and analyze data faster in a secure format. This means significant performance benefits for busy database servers as well as other applications where accelerating time-to-information is critical.

Read more

7 data security trends for 2014

Data thieves are diversifying their methods of attempting to steal sensitive information, says a new report from Trustwave. The research, gathered from 691 data breach investigations from 2013, shows that cybercriminals are increasingly targeting sensitive and confidential information in a variety of new ways, while still exploiting old vulnerabilities to compromise security among individual employees.

scyther5 /

scyther5 /

Below are our 7 highlights from reviewing the report.

  1. Credit cards are still a top priority for would-be data thieves, with 55% of data thefts in 2013 involving payment card data
  2. Thieves are more interested in private information, with thefts of sensitive and confidential information increasing 33% in 2013
  3. 59% of data breach victims live in the US, far ahead of the 2nd most-targeted country, which was the UK at 14%
  4. Retail is the most commonly targeted industry, making up 35% of all attacks. Food and beverage came in second at 18%, and hospitality third, at 11%
  5.  The top 3 subject lines of spam emails were:
    1. “Some Important Information Is Missing”
    2. “Bank Statement. Please Read.”
    3. “Important—Payment Overdue.”
  6. Data thieves love Java. 78% of data thefts involved taking advantage of Java vulnerabilities
  7. Overall, 85% of cybercriminal activity involved exploiting third-party plugins, including Java, Flash and Adobe Reader

Overall, Trustwave recommends first educating employees on best practices to enforce security, and then focusing on strengthening passwords. DRaaS may also be an effective tactic for enterprises concerned about maintaining their security in 2014.

IT may be succeeding at redefining its business role, says new research

Guest author: Ed Konopasek, VP, Cloud and Data Center Solutions

The IT department has recently been in the spotlight as it works to reshape itself to provide more direct business value. New research shows that this heightened focus is paying off. The report from global consulting firm Protiviti shows that 63% of CIOs and IT professionals are noticing a “major IT transformation” happening in their organizations, as IT works to deliver more business value and tighten security measures. The respondents also noted a significant shift in IT’s activities, away from supportive activities (“keeping the lights on”) to become a key part of major business decisions.

Bigedhar /

Bigedhar /

More takeaways:

  • Topics related to cybersecurity and managing data privacy consistently were ranked among the highest priorities by respondents
  • Another top priority was managing and securing ever-growing amounts of data, a process that will likely continue to grow in prominence
  • Interestingly, adding business value was ranked a higher priority than securing company data, perhaps reflecting a growing view that data security and business planning should go hand-in-hand
  • Respondents also ranked monitoring IT costs as a very high priority, reflecting the continued efforts to control IT spending against growing data and computing needs

What’s the top priority in your IT organization this year?

Page 1 of 1412345...10...Last »