data security

January 22, 2018

PERSPECTIVES

Commitment to Cisco Customers Means Taking Data Privacy Seriously

3 min read

In the “old days,” security and data protection responsibilities generally rested solely within organizations’ IT teams. Today, nearly 17,000 devices are added to the Internet every minute, expanding the number of targets attackers can exploit to steal valuable data. Now, in addition to IT teams, business leaders and governments around the globe must dive deep […]

December 2, 2014

DATA CENTER

Pros and Cons: Do-It-Yourself Approaches to Monitoring Shadow IT & Cloud Services

2 min read

Shadow IT is estimated to be 20-40 percent beyond the traditional IT budget. The ease by which organizations can purchase apps and services from cloud service providers (CSP) contributes significantly to this spending. This is an eye-catching number worthy of investigation—not only to identify and reduce costs, but to discover business risks. So, it is […]

November 20, 2014

PARTNER

Partner Voices: Cloud, Data Security, and Business Continuity with Cisco Cloud-Powered Solutions from TekLinks

3 min read

With all of the malware attacks in the world today, sometimes Mother Nature is still the biggest threat to data security. When a deadly tornado outbreak in April 2011 occurred, Peoples Bank of Cullman, AL, experienced firsthand how important it is to have a backup data center location for their core infrastructure.

September 4, 2014

SECURITY

Securing Mobile Data in the Event of Device Loss or Theft

4 min read

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]

July 29, 2014

SECURITY

Summary: Mitigating Business Risks

1 min read

Organizations are rapidly moving critical data into the cloud, yet they still have serious concerns about security and other business risks. Read Bob Dimicco’s blog to learn several important steps companies can take to mitigate the risks of cloud services, such as uncovering shadow IT, assessing data security, and instituting cloud-specific employee policies.

July 24, 2014

SECURITY

Securing Mobile Data: What’s Your Plan?

1 min read

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]

May 16, 2014

DATA CENTER

Emerging Cloud Models: Community Cloud

2 min read

There is no disputing that both enterprises and service providers are embracing cloud.  What’s different today is that not only are telcos cloud providers, but enterprises and governments are also becoming cloud providers through a community cloud model. A community cloud model is a collaborative effort where infrastructure is shared and  jointly accessed by several […]

May 12, 2014

DATA CENTER

How Anyone in Any Industry Can Get Started in Cloud

3 min read

In today’s business landscape, cloud adoption and deployment is more than just a technical discussion. It’s really a choice about how to operate your business, regardless of what industry or vertical your organization is affiliated with. However, as a former CIO, I understand that many CIOs are more concerned with the challenges they face when […]

April 17, 2014

DATA CENTER

Bring Your Own Service: Why It Needs to be on InfoSec’s Radar

4 min read

Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers […]