Five Critical Considerations in an Effective Telehealth Strategy

By Ed Simcox, Healthcare Practice Leader, Logicalis Healthcare Solutions

At Logicalis, we talk to a lot of healthcare CIOs and IT professionals.  And while the clear majority are thinking about and planning ways to optimize the significant investments their organizations have made in electronic health record (EHR) systems, they know they’re missing some pieces of the puzzle. Telehealth is one of those missing links.

Read more

Four Reasons to Consider a FlexPod Refresh

By Brad Bailie, Senior Solutions Architect, Logicalis US

Your CEO has probably already asked you how your compute systems can help the organization be more nimble, adapting to changes and market forces more quickly. And, as you continue your path toward digital transformation, user expectations for enterprise IT rival the performance requirements they have for their outside-of-work lives.  It’s a tall order – and thankfully, there are ways to meet it.

Read more

The Importance of Multi-Factor Authentication

By Ron Temske, Vice President of Security Solutions, Logicalis US

In this article, I want to talk about the importance of Multi-Factor Authentication (MFA) when it comes to providing a comprehensive enterprise security strategy. I’ll provide a brief overview of the technology, discuss why it’s so important and then identify some solutions in this space.

First, the idea of authentication is one that most of us understand. Put simply it’s a method for validating that we are who we say we are. Almost all modern systems provide access based on an authenticated user identity, so getting that correct is critically important, and getting it wrong can mean providing someone with bad intentions access to your privileged systems.

The challenge is that authentication that is simply based on a password alone can be easily compromised. Even if you skip the more common errors, such as simple to guess passwords, writing them on sticky notes, using the same password on multiple accounts, and other poor password and password handling choices, there are many tools that can crack most passwords in a short amount of time. End users often end up changing their passwords, sometimes making them simpler and easier to crack again.

Multi-Factor Authentication is a good method for solving this dilemma. The idea is simple – combine something you know (the password) with something you are or something you possess. The latter can be some type of token, either a physical card or hardware device, or an application running on your mobile device or received as a SMS, something you are may be some type of biometric factor, like a fingerprint or retina scan. Most of your end-users have already used multi-factor authentication whether they realize it or not. When they use their ATM cards to obtain cash, for example. The card is what they possess and the pin is what they know. Without both tightly coupled authenticators they cannot withdraw cash.

MFA is a good idea for all users, but it is also a mandated step by various security standards such as PCI-DSS. According to the Cloud Security Alliance nearly 22 percent of those who reported a breach said it was caused by compromised credentials. This means that a simple, and affordable authentication solution could protect against nearly one-quarter of all security breaches.

Additionally, we there are managed services built around these solutions where a security provider can either manage your new or existing environment, or provide a security-as-a-service solution. Whatever option you choose, an MFA solution is the right choice.

 

Learn More

Read a two-part article exploring what an umbrella approach to security can look like in your enterprise – Part One: Potential DNS Vulnerabilities (http://ow.ly/Gd7Q307SBUE) and Part Two: A Secure DNS (http://ow.ly/kSuT307SCnY). Then, download an infographic displaying the benefits of Taking an Umbrella Approach to Security and one displaying the benefits of Transforming Internet Security with Big Data.

Taking a Threat-Centric Approach to Security

By Ron Temske, Vice President of Security Solutions, Logicalis US

In an earlier article, Back to Basics: Risk-Centric Security Strategy  we discussed a Risk-Centric approach to enterprise security. Briefly, a Risk-Centric Approach to Security is very process-oriented. We discussed the steps used in identifying assets to protect and the level of risk assigned to these assets. Today, I want to take a look at a Threat-Centric Approach to Security.

Read more

Back to Basics: Risk-Centric Security Strategy

By Ron Temske, Vice President of Security Solutions, Logicalis US

In past articles, I’ve focused on specific enterprise security solutions, such as virtual private networks (VPN), next generation firewalls (NGFW), and Secure DNS, but I think it would be helpful to talk about a risk-centric or risk-based security strategy to provide some insight into how many companies are (or should be) looking at enterprise security and how they prioritize security projects. What we want to do for any enterprise security scenario is take a series of steps that form a risk-based security strategy. I’ll outline the process first, then go into more detail about each step. In summary, the process for establishing a risk-based or risk-focused security strategy is:

Read more

How to Benchmark Your Enterprise Security Using the Critical Security Controls Framework

By Ron Temske, Vice President of Security Solutions, Logicalis US

In an earlier blog post, I discussed the importance of a Common Security Framework (CSF) to enterprise security http://www.hypeorripe.com/2017/04/07/what-is-a-common-security-framework-csf/ . In this blog post, I want to dive a little deeper into one specific framework – the SANS 20 / CIS 20 Critical Security Controls (CSC) security framework. CIS stands for Center for Internet Security (www.cisecurity.org) which is a non-profit that leverages the global IT community to safeguard private and public organizations against cyber threats. CIS has no corporate affiliations or ties that would create any conflicts of interest and provides an excellent security framework in Logicalis’ opinion.

Read more

Page 3 of 11412345...102030...Last »
Shares