<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1856953457853813&amp;ev=PageView&amp;noscript=1">

VLCM IT Industry News

Game Changer: Why You Should Consider an Office 365 Move

Posted by Jared Quan on Apr 14, 2015 10:30:00 AM

Microsoft first announced Office 365 way back on October 2010. The same year Burj Khalifa in Dubai was officially opened, and Tom Cruise would later climb on the outside for ‘Mission Impossible Ghost Protocol’. Also the Iceland volcano of Eyjafjallajökull erupted disrupting air traffic across Europe, later to be featured in the movie ‘The Secret Life of Walter Mitty’ with Ben Stiller. Regardless of the announcement in 2010, it wasn’t until 2013 that business began to take the platform seriously. The question now is why should you consider taking the leap to 365?

Read More

Topics: IT Information

SOPHOS 7 Deadly IT Sins: No.1 – Mobile Negligence

Posted by Jared Quan on Apr 9, 2015 2:00:00 PM

Over the course of the next seven weeks we will be reviewing the Sophos 7 Deadly IT Sins. It is apparent that as technology continues to advance and our reliance of technology increases, IT professionals are being forced into a juggling act. One of the heaviest and most critical things companies have to deal with is security. Sophos has a practical saying they like to use ‘the solution to complexity is not more complexity.’ They have set out to tackle security challenges with clarity and confidence.

Read More

Topics: IT Information, Sophos 7 Deadly IT Sins

Finding the Blind Spots before they become real problems: Why you should consider a wireless site survey

Posted by Jared Quan on Apr 7, 2015 1:30:00 PM

Thanks to the consumerization of IT, the BYOD (bring your own device) or BYOT (bring your own technology) explosion continues to expand beyond the previously estimated scope of 1-2 devices per person, leaving companies and even schools doing everything in their power to keep up. With an estimated 75% of companies allowing this expansion, there has been a struggle with a variety of problems. One of which is reliable and consistent coverage.

Read More

Topics: IT Information

HP TippingPoint - Next Gen Firewall keeping pace with the Black Hats

Posted by Jared Quan on Apr 2, 2015 3:00:00 PM

It doesn’t matter if you are a part of a government, a company the size of a major motion picture studio or a ten person small business, recent attacks on companies like British Airways, Ebay, and the Indiana government website, have brought security to the forefront of everyone’s minds.

Read More

Topics: IT Information

BREACHED: Another High Profile Security Hack

Posted by Priscilla Silva on Feb 18, 2015 2:00:00 PM

Yet another high profile breach makes headlines in last week's news. Anthem, the second largest health insurance company in the United States, has about 80 million past and present customers in their database. Little information is known, but the Federal Bureau of Investigation predicts tens of millions in the database were breached including names, addresses and social security numbers. The FBI along with VLCM partner, FireEye, were involved in investigating this "highly sophisticated attack."

"This attack is another reminder of the persistent threats we face, and the need for Congress to take aggressive action to remove legal barriers for sharing cyber threat information," U.S. Rep. Michael McCaul, chairman of the Committee on Homeland Security, said in a statement late Wednesday.

Read More

Topics: IT Information

Study Shows Most Defense-In-Depth Security is Inadequate

Posted by Priscilla Silva on Jan 22, 2015 6:00:00 PM

FireEye encourages all companies to move away from passive, poorly integrated defenses that only provide a fragmented view of threats and cannot connect the dots during advanced attacks. These types of defenses will not combat the commonplace of data breaches and will leave your company more vulnerable. A FireEye special report titled Maginot Revisited: More Real-World Results from Real-World Tests reveals that most defense-in-depth security deployments are inadequate. Download the case study to view a breakdown of companies in every industry, and see FireEye’s advice to move towards a tightly integrated, nimble architecture that enables big-picture vigilance for optimal security.

Today’s security teams can’t afford to passively wait for attacks. Instead, they should take a lean-forward approach that actively hunts for new and unseen threats. Installed behind other security layers, the FireEye sensors offer a unique vantage point from which to gauge other security tools. If a threat is observed, it is only because all other security defenses have failed. Data gathered by more than 1,600 FireEye network and email sensors deployed in real-world networks conclude that attackers are easily bypassing conventional security deployments and breaching systems in every industry.

Read More

Topics: IT Information

What Happens When You Swipe Your Card?

Posted by Priscilla Silva on Dec 4, 2014 3:20:00 PM


IS YOUR INFORMATION SAFE AFTER THE SWIPE?

A new segment on 60 Minutes has people clenching their wallets after revealing how serious cyber threats are to any business, meaning a threat to sensitive consumer information. Just in time for the holidays, security specialists warn businesses and consumers to be alert.

FireEye, a VLCM partner, is a cybersecurity provider hired to monitor business networks from hackers attempting to retrieve sensitive information. According to our partner, 97% of companies get breached. Even the largest organizations can't spend enough to protect their data. Read the summary and view the CBS video segment, below.

FireEye has extensive experience with hackers and malware detection:

Read More

Topics: IT Information

Easy Targets for Security Threats

Posted by Brien M. Posey on Dec 2, 2014 4:30:00 PM

One of the biggest mistakes that I commonly see made with regard to IT security is assuming that security is a "set it and forget it" proposition. Threats change over time, and the security configuration that you use today might not necessarily be a good idea tomorrow.

 

In order to remain secure, organizations need to assess their current security situation on a regular basis. Vulnerability scans must be performed at least quarterly, with a more comprehensive security audit taking place at least annually. These tests can help you to find weaknesses in your defenses. 

Read More

Topics: IT Information

End of Support for Windows Server 2003

Posted by Priscilla Silva on Nov 20, 2014 4:00:00 PM

A warning for Server 2003 datacenters:

Elevated risks are coming to businesses still operating Microsoft Windows Server 2003 as end-of-support nears in July 2015. Although upgrades may not make business sense for some organizations in regards to budget, the Department of Homeland Security seriously warns any IT departments still running these servers of elevated risk, hardware compatibility issues and possible compliance concerns. Microsoft outlines the 4-step process to migrating your Windows Server 2003:

Read More

Topics: IT Information