data security

April 9, 2018

CLOUD

What Have We Done With Our Personal Data?

2 min read

Have you deleted your Facebook account in the wake of the Cambridge Analytica news? I’m not saying you should—really, I’m not—I’m just wondering. Because if you’ve tried, you may have figured out that it’s not that easy.

March 7, 2018

PERSPECTIVES

The Trends Are In: Cisco’s 2018 Cybersecurity Report

2 min read

Cisco's 2018 Annual Cybersecurity Report provides insights on the latest security trends and threats. From integrated solutions to data protection and privacy, we're with you every step of the way.

January 22, 2018

PERSPECTIVES

Commitment to Cisco Customers Means Taking Data Privacy Seriously

3 min read

In the “old days,” security and data protection responsibilities generally rested solely within organizations’ IT teams. Today, nearly 17,000 devices are added to the Internet every minute, expanding the number of targets attackers can exploit to steal valuable data. Now, in addition to IT teams, business leaders and governments around the globe must dive deep […]

December 2, 2014

DATA CENTER

Pros and Cons: Do-It-Yourself Approaches to Monitoring Shadow IT & Cloud Services

2 min read

Shadow IT is estimated to be 20-40 percent beyond the traditional IT budget. The ease by which organizations can purchase apps and services from cloud service providers (CSP) contributes significantly to this spending. This is an eye-catching number worthy of investigation—not only to identify and reduce costs, but to discover business risks. So, it is […]

November 20, 2014

PARTNER

Partner Voices: Cloud, Data Security, and Business Continuity with Cisco Cloud-Powered Solutions from TekLinks

3 min read

With all of the malware attacks in the world today, sometimes Mother Nature is still the biggest threat to data security. When a deadly tornado outbreak in April 2011 occurred, Peoples Bank of Cullman, AL, experienced firsthand how important it is to have a backup data center location for their core infrastructure.

September 4, 2014

SECURITY

Securing Mobile Data in the Event of Device Loss or Theft

4 min read

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]

July 29, 2014

SECURITY

Summary: Mitigating Business Risks

1 min read

Organizations are rapidly moving critical data into the cloud, yet they still have serious concerns about security and other business risks. Read Bob Dimicco’s blog to learn several important steps companies can take to mitigate the risks of cloud services, such as uncovering shadow IT, assessing data security, and instituting cloud-specific employee policies.

July 24, 2014

SECURITY

Securing Mobile Data: What’s Your Plan?

1 min read

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]

May 16, 2014

DATA CENTER

Emerging Cloud Models: Community Cloud

2 min read

There is no disputing that both enterprises and service providers are embracing cloud.  What’s different today is that not only are telcos cloud providers, but enterprises and governments are also becoming cloud providers through a community cloud model. A community cloud model is a collaborative effort where infrastructure is shared and  jointly accessed by several […]