It’s Time to Consider CIS Controls for Your Enterprise Security

By Ron Temske, Vice President of Security Solutions, Logicalis US

In previous blog articles, I’ve mentioned the Center for Internet Security (CIS), a nonprofit that harnesses the power of the global IT community to safeguard private and public organizations against cyber threats. We think very highly of their approach to cybersecurity, so much so in fact, that Logicalis recently became an Organizational Consulting Member of CIS because we recognize that its approach to security aligns very tightly with our own and supports our values. Here’s why we find CIS important and I think that you will as well.

Read more

K-12 Digital Learning Framework in 2017

By Adam Petrovsky, GovEd Practice Leader, Logicalis GovEd

As K-12 students approach their end-of-year (around late May), teachers and staff are busy with exams, supervising end-of-school activities and packing up their classrooms.  Behind the scenes, however, school administrators are using the summer-break session for implementing innovative technologies, planning for next year’s initiatives and moving one step closer to a fully digital learning environment.

Read more

Enterprise Security Blog: Ransomware

By Ron Temske, Vice President of Security Solutions, Logicalis US

Recent large-scale ransomware attacks have placed a premium on information about ransomware and what you can do to best protect your organization. Please note – ransomware attacks continue to spread, even as this blog is published, so new information may expand on (or contradict) what’s noted below. This post is current as of May 15, 2017.

Read more

Five Critical Considerations in an Effective Telehealth Strategy

By Ed Simcox, Healthcare Practice Leader, Logicalis Healthcare Solutions

At Logicalis, we talk to a lot of healthcare CIOs and IT professionals.  And while the clear majority are thinking about and planning ways to optimize the significant investments their organizations have made in electronic health record (EHR) systems, they know they’re missing some pieces of the puzzle. Telehealth is one of those missing links.

Read more

Four Reasons to Consider a FlexPod Refresh

By Brad Bailie, Senior Solutions Architect, Logicalis US

Your CEO has probably already asked you how your compute systems can help the organization be more nimble, adapting to changes and market forces more quickly. And, as you continue your path toward digital transformation, user expectations for enterprise IT rival the performance requirements they have for their outside-of-work lives.  It’s a tall order – and thankfully, there are ways to meet it.

Read more

The Importance of Multi-Factor Authentication

By Ron Temske, Vice President of Security Solutions, Logicalis US

In this article, I want to talk about the importance of Multi-Factor Authentication (MFA) when it comes to providing a comprehensive enterprise security strategy. I’ll provide a brief overview of the technology, discuss why it’s so important and then identify some solutions in this space.

First, the idea of authentication is one that most of us understand. Put simply it’s a method for validating that we are who we say we are. Almost all modern systems provide access based on an authenticated user identity, so getting that correct is critically important, and getting it wrong can mean providing someone with bad intentions access to your privileged systems.

The challenge is that authentication that is simply based on a password alone can be easily compromised. Even if you skip the more common errors, such as simple to guess passwords, writing them on sticky notes, using the same password on multiple accounts, and other poor password and password handling choices, there are many tools that can crack most passwords in a short amount of time. End users often end up changing their passwords, sometimes making them simpler and easier to crack again.

Multi-Factor Authentication is a good method for solving this dilemma. The idea is simple – combine something you know (the password) with something you are or something you possess. The latter can be some type of token, either a physical card or hardware device, or an application running on your mobile device or received as a SMS, something you are may be some type of biometric factor, like a fingerprint or retina scan. Most of your end-users have already used multi-factor authentication whether they realize it or not. When they use their ATM cards to obtain cash, for example. The card is what they possess and the pin is what they know. Without both tightly coupled authenticators they cannot withdraw cash.

MFA is a good idea for all users, but it is also a mandated step by various security standards such as PCI-DSS. According to the Cloud Security Alliance nearly 22 percent of those who reported a breach said it was caused by compromised credentials. This means that a simple, and affordable authentication solution could protect against nearly one-quarter of all security breaches.

Additionally, we there are managed services built around these solutions where a security provider can either manage your new or existing environment, or provide a security-as-a-service solution. Whatever option you choose, an MFA solution is the right choice.


Learn More

Read a two-part article exploring what an umbrella approach to security can look like in your enterprise – Part One: Potential DNS Vulnerabilities ( and Part Two: A Secure DNS ( Then, download an infographic displaying the benefits of Taking an Umbrella Approach to Security and one displaying the benefits of Transforming Internet Security with Big Data.

Page 5 of 117« First...34567...102030...Last »