What do these three things have in common? For Lone Star College System (LSCS), the fastest growing community college in the U.S., these items helped build a whole new technology foundation.
While at a higher-education conference, CIO of LSCS, Link Alander, and former VP of data center virtualization at Presidio, Steve Kaplan, began hashing out what it would take to deliver the best computing experience—on a napkin. They jotted down all the ways technology could deliver a customizable, optimal, and educational platform to students and faculty.
The vision was a toolbox, not just any one tool: an entire resource pool for professors to contribute to -- and students to pull from -- anytime, on any device, from anywhere.
From peeking at Brittany Spears medical records to the theft of almost five million medical records from a tape back-up, no healthcare issue garners more adverse publicity, or passion, than violations of patient privacy. While you might expect that since the institution of HIPAA and quarter million dollar fines that this is relatively uncommon now, you would be wrong. A stunning incidence of nearly 18 million breaches of privacy has occurred over the past two years according to a recent report from ANSI, the American National Standards Institute. That is equivalent to the population of the states of Florida or New York.
As the world moves towards adoption of Electronic Health Records and Health Information Exchanges, concern for the vulnerability of private health information is escalating as the scale of these data breaches reach epic proportions. A West Coast health care system experienced the theft of electronic health information for 4 million of its patients. And another major academic medical center inadvertently disclosed the electronic health records of 20,000 of its patients. The risks are real and global. And they leave an organization -- any organization -- subject to severe legal and financial damage, not to mention the damage to their reputation. None of these organizations were cavalier about their security compliance. But let’s face it, the workforce is larger and more mobile. The data is more prolific and ubiquitous and takes on many different forms. And the thieves are getting more sophisticated.
But so are the solutions. In the past, it was necessary to balance mobility with security-the more mobile, the less secure. Not anymore. Cisco’s AnyConnect combines industry-leading Cisco cloud and premises-based web security and next generation remote access technology to deliver the most robust and secure enterprise mobility solution on the market today.
This checklist can help you secure your network and critical company data
Every small business needs to protect its network and data from viruses, malware, and other malicious threats. A breach could cost your company not only lost revenue and the expense of recovering damaged systems but also your reputation in the marketplace. “Reputation is lost overnight. It takes a lifetime to get it back,” says Danny Pang, who runs a cyber café, Geek Terminal, in Singapore.
If you don’t currently have any safeguards in place or you’re not sure what they are, where do you start in bolstering your network and data security? Here are six steps you can take to fortify your defenses.
In an effort to reduce costs and improve operational efficiency, organizations of all sizes have begun compressing their firewall and other security services into smaller form factors and fewer physical units. Many small and midsized companies have opted for UTMs to run all of their security on a single box. Unfortunately, UTMs have failed to deliver on their promise to deliver true multi-service security. Most UTMs do one or two things really well, but add all the other services as “checkbox” items just to say they have it. Read More »
I was at a technology conference in London late last year, and the topic was mobility – and, inevitably, BYOD: bring your own device.
The mobility evangelists (and they dominated the four-person panel) waxed poetic as to all the fabulous things that iPhone- and Android-armed employees could bring to the business. Rich content! Social networking! Collaboration! Meeting each other for lunch!
Then a grouchy American analyst walked to the podium, and growled two words: “Data Security.”
And silence fell like a thick blanket over the room.
BYOD is one of technology’s topics du jour, an issue that will create a few tons of PowerPoint and a fresh revenue line for consulting firms in the next 18-24 months.
Cynicism aside, it’s a very important issue – and not just for ICT shops. And, it’s an issue that will be easily misunderstood.
Yes, BYOD is about data security. Yes, there’s a need for hard and high corporate security walls. Clearly-stated rules. And devout attention to PCI.
But beyond that, let’s pause and reflect.
BYOD is not about the devices. The devices will continue to evolve at Moore’s Law speed, and the stuff the kids are bringing into the office today will be obsolete by the time your new policies reach the governance committee.
Truth be told, BYOD is about the big tech-driven generational change in expectations and behavior. It’s about the new normal of life with the Internet. Life in the Internet.
It’s about Millennials who use technology like I use a knife and fork. It’s about a tsunami wave flooding every phase of business life – from the headquarters office to the distribution center to the store.
And this tsunami will not just touch devices. It will drive change in the cloud content that employees will use. It will drive change in their willingness to sit in cubes (versus do the work at home or at Starbucks or wherever there’s a fast wireless pipe). It will drive change in their expectations for interaction and participation, for education and training.
It will even touch the glowing third rail of data security. (As this is the generation of Wiki-Leaks and unbridled transparency on Facebook.)